Adobe photoshop for macbook pro??

hi
about to order my mabook pro within the next few weeks but i saw a macuser review taht says taht photoshop runs slower on macbook than on a powerbook due to the rosetta conversions.
has anyone any info on when adobe will release a reprogrammed version??
thanks
mark

Not really appropriate for this forum, however, the answer is no one knows for sure. It seems it will be "later this year". Now, from a benchmarking standpoint, the program is not a "dog" on the MBP, albiet a bit slower. It all depends on what you are coming from! If a very old machine, you will be happy because it will most likely run better....
Bob

Similar Messages

  • Trying to install adobe photoshop on macbook pro but at 50% it gives error message and kicks out dis

    trying to install adobe photoshop on macbook pro but at 50% it gives error message and kicks out disc

    copy the disc contents to a desktop folder and click setup in that desktop folder.
    if that fails what ps version are you trying to install and what is your os version?

  • Adobe Illustrator for MacBook Pro

    ?What version of Adobe Illustrator will work on a MacBook Pro with OS10.6.8 and a 2.16GHz Intel Core Duo processor?

    Gaajoowo,
    According to this, up to CS6 (which is the only one you can buy from Adobe):
    http://helpx.adobe.com/illustrator/system-requirements.html

  • I bought Adobe Photoshop Elements 13 They sent me the one for Windows and I need the one for Macbook Pro!!!

    The download that adobe sent me is for Windows. I have a Mac and I need the one for Macbook Pro. I have been looking for a contact with customer service and even the chat is not working. Help please! I haven't use the product they sent me

    Please open link
    Contact Customer Care
    Then click on still need help, you will get the chat option

  • Where can I download a free trial of adobe photoshop for mac os x 10.5?

    Hi,
    I cant seem to find a free download of adobe photoshop for my mac os x 10.5. Does anyone know where I could find this?

    Should you have been misled about the capabilities of the iBook G3
    portable PowerPC-based Apple computer you bought online, you may
    be able to return it; misrepresented products may be returned if you
    bought through such places as eBay, etc.
    Also, the name iBook has been re-used, it currently not only applies to
    old vintage or obsolete Apple portable PowerPC G3/G4 computers, it
    also applies to the newer iBooks ebooks, applications, software, and an
    author application where later spec computer or device systems are
    needed to utilize their function. But not current portable computers.
    For relatively inexpensive Intel-based white polycarbonate Apple portable
    computers that could run Snow Leopard 10.6.8 or Lion 10.7, you may find
    some resellers of repaired or used stocks, with Core2Duo processors,
    and these MacBook entry-level models replaced the PowerBook/iBook G4
    builds in 2006, then were discontinued by 2010. Now there are MacBook/Air
    MacBook/Pro models, the latest models are rather different in build & OS X.
    everymac.com has information about most all Macs, including portables
    and their years of manufacture, specification, and other details.
    So, I'd check into the returns situation, and get some model of more recent
    build; even a repaired one with a limited guarantee could be OK. Depending
    on what your expectations are, you may find a deal, or a disappointment in
    trying to find a bargain without  more information on what their limits are.
    Older models no longer made appear in online resale sites, some companies
    repair and resell a variety and their inventory is changing all the time. But other
    resellers may not really know anything at all about the items they sell on ebay.
    A local Mac user group may be helpful with locating something nearby. Or you
    could try some online resellers who have a good reputation among Mac users.
    In any event...
    Good luck & happy computing!

  • What is the shortcut key to highlight words in adobe reader in macbook pro

    what is the shortcut key to highlight words in adobe reader in macbook pro?
    Shift + U is not working
    how can i change shortcut key?

    I don't believe there is a keyboard shortcut available for that feature. But I believe if you click-select the topmost chapter, and Shift-click the bottommost chapter, it should select them all.
    Other shortcuts for books can be set up in Edit > Keyboard Shortcuts in the Panel Menus product area. There are no default shortcuts in that area.

  • I bought the wrong version as I need it for macbook pro but somehow bought windows...help

    I guess I will have to wait until normal office hours.  I have no idea why it bought the window version as I did not realize that is what was selected.  I hope I can get it exchanged for the photoshop elements 13 for macbook pro retina display.     Anyone know if this is an easy switch and one they will do?

    When buying HD versions of shows, only the HD copy will automatically download now (probably due to requests from people who don't need/want the SD version and complained about it being forced on them). The SD copy can be downloaded from your purchases area in iTunes, though. On the main iTunes Store page, go to Purchases under the Quick Links and then select TV shows. Click the "Not On This Computer" button. Uncheck the "Download HD when available" box and you should then see the SD copies of the shows and be able to download them.
    Regards.

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Photo editor for macbook pro similar to afterlight, vsco cam, whitagram?

    photo editor for macbook pro similar to afterlight, vsco cam, whitagram?

    Photoshop will run on your MBP. Is Photoshop too complicated?
    Other possibilities:
    Seashore (free)
    The Gimp (free)
    Graphic Coverter ($45 approx)
    Acorn ($50 approx)
    Pixelmator ($50 approx)
    Photoshop Elements ($75 approx)
    There are many, many other options. Search on MacUpdate or the App Store.

  • The normal value of battery capacity for macbook pro

    Hi there,
         I noticed my battery full charge capacity value is way below the technical specification from Apple.
    For macbook pro 15" early 2011 version a 77.5W battery is built-in.
    However, so far after 4 cycle, my full charge capacity is 6913mAh.
    It seems that I missed something. Though I didn't really notice the initial value when it's brandnew.
         Statistically what's the average value of the new battery will be ? around 75W or 7500mAh? Any idea?

    Best battery info resource is here:
    https://discussions.apple.com/thread/1764220?threadID=1764220

  • How can I know if my new internal hd for macbook pro is compatible?

    I have been trying to upgrade my internal HD for macbook pro early 2008 2.4 and have been having a hard time getting it to boot.  Problems with both WD and Seagate.  I am wondering if the problem is with Mavericks.  I got a good back up from Time Machine to load on the hybrid drive.  Then when I try to restart it shows the apply symbol with no chime and then a black screen comes over the blue screen with some code (strange problem I have never seen) I can see that all the data is on the drive.  I was able to partitian in disk utility.  Anything ringing a bell.  I have done several switches like this and this is the first time I have had so much trouble.  I reinstalled my old drive just to make sure there was not another hardward issue and everything is fine there.  In fact I have a new logic board freshly installed by mac. 

    Your machine has a SATA 2 interface and I'm sure the new drives are SATA 3. They should still step down and work though. It's possible your SATA cable is marginal and the newer drive is trying to demand more out of it than the old one did. A good test would be to put the new drive in an external enclosure and see if it works ok from there. If so, it's probably the cable.
    http://www.amazon.com/Sabrent-2-5-Inch-Aluminum-Enclosure-EC-TB4P/dp/B005EIGUD4/ ref=sr_1_2?s=electronics&ie=UTF8&qid=1394657992&sr=1-2&keywords=2.5+enclosure
    How did you install Mavericks on the new drive?

  • Internal Hard drive for macBook pro 13 inch.

    Hello everybody :")  
    How are you? I hope that everyone is fine.
    I have come today  i need your opinion and your advice to me about my (HDD)
    i need to buy new HD for my book pro .
    Can you answer my questions and give me advice
    frist i will write for you my MBP information :
    MacBook Pro 13 inch - 4 GB  memory -  the old HD is  320 GB 5400 rpm - Processor i5 dual core .
    made in 2010
    * note :Almost i'm not interested in (SSD)  because the price is expensive SSD  to storage capacity that can i give it .
                   HDD  was excellent with me .
    -What are the types of HDD which advise me?
    - what best HDD for macbook pro ? ( toshiba or WD )
    - how I choose from among types of HDD ?
    -How do I know what types are compatible with my device? Is there site or previous experience advise can help me !
    What your opinion  about this kind:
    Seagate Momentus XT 750 GB 7200RPM
    are good for my MBP ?
    I care about the quality, performance and  more than speed.
    Thank you in advance
    I hope to help me soon

    Di.grad 
    toshiba 1.tb and 7200 RPM ?
    Those are same as use by Apple in the non-retina macbook Pro, Ive got piles of them, only a Hitachi is better.
    Toshiba HD are a hair noisy even by Toshiba own admission, but no big deal.
    I would NEVER buy from OWC merely for the reasons that their prices are miserable.
    Here you go,   $65
    http://www.ebay.com/itm/TOSHIBA-MQ01ABD100-1TB-5400-RPM-8MB-Cache-2-5-SATA-3-0Gb -s-Internal-Notebook-/121107538930?pt=US_Internal_Hard_Disk_Drives&hash=item1c32 9263f2
    same as used by APPLE in their own.

  • I want to get a hard case for my macpro.. Is this a hard case or silicon? Speck 13" SeeThru Satin Case for MacBook Pro and MacBook

    I want to get a hard case for my macpro.. Is this a hard case or silicon? Speck 13" SeeThru Satin Case for MacBook Pro and MacBook. Says hard cse but then easy to grip...anyone have one?

    description directly from the website: "Form-fitting hard-shell protection with a smooth, grippy, soft-touch feel."
    https://www.speckproducts.com/seethru-satin-macbook-pro-case-13-black.html

  • Adobe Lightroom on MacBook Pro does not see my iphoto library

    Adobe Lightroom on MacBook Pro does not see my "iphoto library"

    Hello.
    The problem is that the iPhoto library is inside of iPhoto. Lightroom won't let you select it because it's basically a shortcut to iPhoto. Try exporting the images you need or all of them, depending on what you need.

  • HT1338 how to download adobe reader on macbook pro

    how to download adobe reader on macbook pro?

    First of all, I want you to know that Mac OS X already has the ability to open and read PDF files. You do it with the Preview application. Also, on the Mac Adobe Reader is the third most vulnerable application to security risks. That is due to exploit are delivered through PDF files.
    If you decide to download it you should still stick to using Preview to open PDF files and only use Adobe Reader in the few cases that Adobe Reader is absolutely required. Preview is not vulnerable to the same exploits as Adobe Reader because it does not have all the capabilities as Adobe Reader.
    To get Adobe Reader go to: http://get.adobe.com/reader/
    Click on the download button. Once the download completes install the software.

Maybe you are looking for

  • IMessage not sending messages on iPhone 5

    New iPhone 5 has been having all kinds of problems with messages.  Phone is set to use iMessage and some are delayed for DAYS before arriving.  When someone tries to send and iMessage, it will generally get stuck at Sending.  Outgoing iMessages say d

  • How can I save multiple tabs to open at the same time?

    Hi, I have a set of websites that I need to access regularly and I'd like to be able to open all the tabs in a window at the same time rather than clicking on each one individually.  I know this was possible in previous safari versions but I can't fi

  • Switching phones #'s for phones on my plan under contract?

    My husband recently took a position with his company that will give him a cell phone.  He would like to port his phone # over to his company account (which is also Verizon).  I have an added line on the account already that is not under contract.  Co

  • Field sales related tables and Transaction code

    Dear SAPGurus, I have been working with field sales activities in mySAP CRM.. Can I have the list of the tables and transaction code related to Field sales sales activies.. I am grateful for ur help.... I would like to appreciate u by rewarding the p

  • Repeated restart/bluescreen with clean install of Tiger

    Hi, Been running 10.4.7 just fine on my dual G4 MDD/FW800 Mac. I only had the original 128GB hard drive plus an external 250GB hard drive. I added an internal 500GB hard drive, split it into two equal-sized volumes, ran a verify/permission check and