Best cleaning method for i pad screen

What are the best cleaning methods for the touch screen on the i pad /  Lot of fingerprints need to be removed.  Any special product recommendations?

Personally I just use cleaning cloths such as those for camera lenses or glasses.

Similar Messages

  • What is the best 'cleaning system' for the Mac?

    What do you recommend as the best 'cleaning system' for the Mac!

    How to maintain a Mac
    Make two or more backups of all your files
    One backup is not enough to be safe. A copy of a backup doesn't count as another backup; all backups must be made directly from the original data.
    Keep at least one backup off site at all times in case of disaster. Backing up to a cloud-data service is one way to accomplish this, but don't rely exclusively on such backups.
    In fact, don’t rely exclusively on any single backup method, such as Time Machine.
    If you get an indication that a backup has failed, don't ignore it.
    Keep your software up to date
    In the App Store or Software Update preference pane (depending on the OS version), you can configure automatic notifications of updates to OS X and other Mac App Store products. Some third-party applications from other sources have a similar feature, if you don’t mind letting them phone home. Otherwise you have to check yourself on a regular basis.
    Keeping up to date is especially important for complex software that modifies the operating system, such as device drivers. Don't install such modifications unless they're absolutely necessary. Remove them when they are no longer needed. Before installing any Apple update, you must check that all system modifications that you use are compatible. Incompatibility with third-party software is by far the most common cause of difficulties with system updates.
    Don't install crapware
    ...such as “themes,” "haxies," “add-ons,” “toolbars,” “enhancers," “optimizers,” “accelerators,” "boosters," “extenders,” “cleaners,” "doctors," "tune-ups," “defragmenters,” “firewalls,” "barriers," “guardians,” “defenders,” “protectors,” most “plugins,” commercial "virus scanners,” "disk tools," or "utilities." With very few exceptions, such stuff is useless or worse than useless. Above all, avoid any software that purports to change the look and feel of the user interface.
    It's not much of an exaggeration to say that the whole "utility" software industry for the Mac is a fraud on consumers. The most extreme examples are the "CleanMyMac," "TuneUpMyMac," and “MacKeeper” scams, but there are many others.
    As a rule, you should avoid software that changes the way other software works. Plugins for Photoshop and similar programs are an obvious exception to this rule. Safari extensions, and perhaps the equivalent for other web browsers, are a partial exception. Most are safe, and they're easy to get rid of if they don't work. Some may cause the browser to crash or otherwise malfunction. Some are malicious. Use with caution, and install only well-known extensions from relatively trustworthy sources, such as the Safari Extensions Gallery.
    Only install software that is useful to you, not (as you imagine) to the computer. For example, a word processor is useful for writing. A video editor is useful for making movies. A game is useful for fun. But a "cache cleaner" isn't useful for anything. You didn't buy a computer so you could clean caches.
    Never install any third-party software unless you know how to uninstall it. Otherwise you may create problems that are very hard to solve. Do not rely on "utilities" such as "AppCleaner" and the like that purport to remove software.
    Don't install bad, conflicting, or unnecessary fonts
    Whenever you install new fonts, use the validation feature of the built-in Font Book application to make sure the fonts aren't defective and don't conflict with each other or with others that you already have. See the built-in help and this support article for instructions.
    Deactivate or remove fonts that you don't really need to speed up application launching.
    Avoid malware
    "Malware" is malicious software that circulates on the Internet. This kind of attack on OS X was once so rare that it was hardly a concern, but it's now increasingly common and dangerous.
    There is some built-in protection against malware, but you can’t rely on it—the attackers are always at least one day ahead of the defense. You can’t rely on third-party "anti-virus" products for protection either. What you can rely on is common-sense awareness—not paranoia, which only makes you more vulnerable.
    Never install software from an untrustworthy or unknown source. If in doubt, do some research. Any website that prompts you to install a “codec” or “plugin” that comes from the same site, or an unknown site, is untrustworthy. Software with a corporate brand, such as Adobe Flash Player, must come directly from the developer's website. No intermediary is acceptable, and don’t trust links unless you know how to parse them. Any file that is automatically downloaded from the web, without your having requested it, should go straight into the Trash. A web page that tells you that your computer has a “virus,” or that anything else is wrong with it, is a scam.
    In OS X 10.7.5 or later, downloaded applications and Installer packages that have not been digitally signed by a developer registered with Apple are blocked from loading by default. The block can be overridden, but think carefully before you do so.
    Because of recurring security issues in Java, it’s best to disable it in your web browsers, if it’s installed. Few websites have Java content nowadays, so you won’t be missing much. This action is mandatory if you’re running any version of OS X older than 10.6.8 with the latest Java update. Note: Java has nothing to do with JavaScript, despite the similar names. Don't install Java unless you're sure you need it. Most people don't.
    Don't fill up your disk or SSD
    A common mistake is adding more and more large files to your home folder until you start to get warnings that you're out of space, which may be followed in short order by a startup failure. This is more prone to happen on the newer Macs that come with an internal SSD instead of the traditional hard drive. The drive can be very nearly full before you become aware of the problem.
    While it's not true that you should or must keep any particular percentage of space free, you should monitor your storage use and make sure you're not in immediate danger of using it up. According to Apple documentation, you need at least 9 GB of free space on the startup volume for normal operation.
    If storage space is running low, use a tool such as OmniDiskSweeper to explore the volume and find out what's taking up the most space. Move seldom-used large files to secondary storage.
    Relax, don’t do it
    Besides the above, no routine maintenance is necessary or beneficial for the vast majority of users; specifically not “cleaning caches,” “zapping the PRAM,” "resetting the SMC," “rebuilding the directory,” "defragmenting the drive," “running periodic scripts,” “dumping logs,” "deleting temp files," “scanning for viruses,” "purging memory," "checking for bad blocks," "testing the hardware," or “repairing permissions.” Such measures are either completely pointless or are useful only for solving problems, not for prevention.
    To use a Mac effectively, you have to free yourself from the Windows mindset that every computer needs regular downtime for maintenance such as "defragging" and "registry cleaning." Those concepts do not apply to the Mac platform.
    A well-designed computing device is not something you should have to think about much. It should be an almost transparent medium through which you communicate, work, and play. If you want a machine that needs a lot of attention just to keep going, use a PC, or collect antique cars.
    The very height of futility is running an expensive third-party application called “Disk Warrior” when nothing is wrong, or even when something is wrong and you have backups, which you must have. Disk Warrior is a data-salvage tool, not a maintenance tool, and you will never need it if your backups are adequate. Don’t waste money on it or anything like it.

  • How to best clean your (my) iPhone touch screen?

    Hi all,
    I've had a total of two touch screen mobile phones in my life: a Samsung Jet and my current iPhone 4, and with the former, keeping the screen clean was quite an ordeal, as it acted like a magnet for finger marks, but at least when I wiped it clean with a soft microfiber cloth and a soft detergent, it indeed looked clean. Not so my iPhone, which, as I understand it, has a special hydrophobic coating on the screen. Said screen looks clean enough when I'm done cleaning it, but I see some tiny droplets of cleaning fluid remaining on the screen for several long seconds after I'm done wiping it with the (clean...) microfiber cloth, so I'd like to know if there's a better method for keeping my iPhone relatively clean, aside from exhaling on the glass and wiping the condensation immediately, of course...

    You've got to be sure not to grind any dirt particles into the glass, as these can leave scratches in the coating or even the glass. The glass is scratch resistant, but not scratch proof.
    I've had every iPhone since the original, and have always gently wiped the screens with a damp (not wet) cloth. No solvents or alcohol, just damp from ordinary tap water. Then, a light buff with microfiber to finish it off.
    I've never scratched a screen using this cleaning method.
    Mike

  • Best isolation method for Web Dynpr iViews ?

    I'm going to develop some Web Dynpro iView to be integrated into the SAP EP.
    THese iViews should work with KM APIs.
    I read into the HelpOnline it's possible to chose between Embedded or the URl isolation method.
    As far I know te web Dynpro tecnology offers the special client able to render just the changes and not the whole page....but i expect i have to set anyway an isolation method.
    I would like to know which in your opinion the best isolation settings method for the WebDynpro iView.
    regards and thanks in advance

    Hi Mauro,
        URL isolation method is better for several reasons:
    1. Performance: In Embedded Isolation method iView content is collected at the server side and sent to the client with the entire page, which obviously degrades performance.
    2. PageBuilder limitations: Page does not add scrollbars to iViews is one such limitation.
    3. A page may contain several form-type iViews. If the isolation method is set to Embedded, one iView may lose the information in its input fields when another form on the page is submitted.
    Regards,
    Satyajit.

  • Best authentication method for controlling access to wlan

    What is the best method for controlling access to a wlan with a 5508 wlan controller
    The requirments are
    -Needs to support all types of clients (Mac, PC, smartphones, tablets)
    -Clients need to be able to connect easily and without errors or installing certs or wireless profiles etc..
    -Secure
    This doesn't seem like alot to ask but I keep running into problems.
    What are people using?
    Thanks

    I can't find an errors in any area of the event viewer.
    Here is these files cat'd together.
    GeoTrustGlobalCA
    GeoTrustDVSSLCA
    corp-vs-ca2.########-export
    -----BEGIN CERTIFICATE-----
    MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
    YWwgQ0EwHhcNMDIwNTIxMDQwMDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQG
    EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMSR2VvVHJ1c3Qg
    R2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2swYYzD9
    9BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdq
    fnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDv
    iS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU
    1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+
    bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoW
    MPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTA
    ephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVkDBF9qn1l
    uMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKIn
    Z57QzxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfS
    tQWVYrmm3ok9Nns4d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcF
    PseKUgzbFbS9bZvlxrFUaKnjaZC2mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Un
    hw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6pXE0zX5IJL4hmXXeXxx12E6nV
    5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvmMw==
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIID+jCCAuKgAwIBAgIDAjbSMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
    YWwgQ0EwHhcNMTAwMjI2MjEzMjMxWhcNMjAwMjI1MjEzMjMxWjBhMQswCQYDVQQG
    EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UECxMURG9tYWluIFZh
    bGlkYXRlZCBTU0wxGzAZBgNVBAMTEkdlb1RydXN0IERWIFNTTCBDQTCCASIwDQYJ
    KoZIhvcNAQEBBQADggEPADCCAQoCggEBAKa7jnrNpJxiV9RRMEJ7ixqy0ogGrTs8
    KRMMMbxp+Z9alNoGuqwkBJ7O1KrESGAA+DSuoZOv3gR+zfhcIlINVlPrqZTP+3RE
    60OUpJd6QFc1tqRi2tVI+Hrx7JC1Xzn+Y3JwyBKF0KUuhhNAbOtsTdJU/V8+Jh9m
    cajAuIWe9fV1j9qRTonjynh0MF8VCpmnyoM6djVI0NyLGiJOhaRO+kltK3C+jgwh
    w2LMpNGtFmuae8tk/426QsMmqhV4aJzs9mvIDFcN5TgH02pXA50gDkvEe4GwKhz1
    SupKmEn+Als9AxSQKH6a9HjQMYRX5Uw4ekIR4vUoUQNLIBW7Ihq28BUCAwEAAaOB
    2TCB1jAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFIz02ZMKR7wAoErOS3VuoLaw
    sn78MB8GA1UdIwQYMBaAFMB6mGiNifurBWQMEX2qfWW4ysxOMBIGA1UdEwEB/wQI
    MAYBAf8CAQAwOgYDVR0fBDMwMTAvoC2gK4YpaHR0cDovL2NybC5nZW90cnVzdC5j
    b20vY3Jscy9ndGdsb2JhbC5jcmwwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzAB
    hhhodHRwOi8vb2NzcC5nZW90cnVzdC5jb20wDQYJKoZIhvcNAQEFBQADggEBADOR
    NxHbQPnejLICiHevYyHBrbAN+qB4VqOC/btJXxRtyNxflNoRZnwekcW22G1PqvK/
    ISh+UqKSeAhhaSH+LeyCGIT0043FiruKzF3mo7bMbq1vsw5h7onOEzRPSVX1ObuZ
    lvD16lo8nBa9AlPwKg5BbuvvnvdwNs2AKnbIh+PrI7OWLOYdlF8cpOLNJDErBjgy
    YWE5XIlMSB1CyWee0r9Y9/k3MbBn3Y0mNhp4GgkZPJMHcCrhfCn13mZXCxJeFu1e
    vTezMGnGkqX2Gdgd+DYSuUuVlZzQzmwwpxb79k1ktl8qFJymyFWOIPllByTMOAVM
    IIi0tWeUz12OYjf+xLQ=
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIIFaDCCBFCgAwIBAgIDBo5UMA0GCSqGSIb3DQEBBQUAMGExCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRh
    dGVkIFNTTDEbMBkGA1UEAxMSR2VvVHJ1c3QgRFYgU1NMIENBMB4XDTEzMDQyNTA4
    NTEzNVoXDTE1MDQxNTA0NDcyOVowgdQxKTAnBgNVBAUTIHNZbkoyTG0tb2dGZnZC
    aFlodWRqWVZIMndEek43MGdOMRMwEQYDVQQLEwpHVDU3NDYxMTU1MTEwLwYDVQQL
    EyhTZWUgd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMvY3BzIChjKTEzMTcwNQYD
    VQQLEy5Eb21haW4gQ29udHJvbCBWYWxpZGF0ZWQgLSBRdWlja1NTTChSKSBQcmVt
    aXVtMSYwJAYDVQQDEx1jb3JwLXZzLWNhMi5wb3BtdWx0aW1lZGlhLmNvbTCCASIw
    DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM4jgpKBeo8rtM/zJIEyho3HppeU
    tZeK+wmLfPeBTJxr2UmQFOmcniQblgsHREAGyJR0KT5yrYzxx6wpZaqCUcZlxl1Z
    lUz5mfxHnL5Oc14sUnqwaJuxprXV5Rnclci6W6BMFjI4QoxXjQwSa+3A1enf+ZsO
    sXUojQbQx62MX8rINuQ+srgdDielK/mJqTAMt11x6+NqIpwlGAgOxKd7vjG6aKRf
    a2efvS/hK4Pi0ieWPGn1GXz/AlYpHQv0cppUr8huL/+2+9cEvd1sp8XN/ASN3YTm
    WWo//fVpbXIlzp8mU4Q7t8+7LglxFQabhl4eMBarMi8SnNuh2zYKQxJRPvsCAwEA
    AaOCAbMwggGvMB8GA1UdIwQYMBaAFIz02ZMKR7wAoErOS3VuoLawsn78MA4GA1Ud
    DwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwKAYDVR0R
    BCEwH4IdY29ycC12cy1jYTIucG9wbXVsdGltZWRpYS5jb20wQQYDVR0fBDowODA2
    oDSgMoYwaHR0cDovL2d0c3NsZHYtY3JsLmdlb3RydXN0LmNvbS9jcmxzL2d0c3Ns
    ZHYuY3JsMB0GA1UdDgQWBBSODVVgPunABo61x13N20tEP66egDAMBgNVHRMBAf8E
    AjAAMHUGCCsGAQUFBwEBBGkwZzAsBggrBgEFBQcwAYYgaHR0cDovL2d0c3NsZHYt
    b2NzcC5nZW90cnVzdC5jb20wNwYIKwYBBQUHMAKGK2h0dHA6Ly9ndHNzbGR2LWFp
    YS5nZW90cnVzdC5jb20vZ3Rzc2xkdi5jcnQwTAYDVR0gBEUwQzBBBgpghkgBhvhF
    AQc2MDMwMQYIKwYBBQUHAgEWJWh0dHA6Ly93d3cuZ2VvdHJ1c3QuY29tL3Jlc291
    cmNlcy9jcHMwDQYJKoZIhvcNAQEFBQADggEBAC2Kadfzc6X/3dI//J5SGR9fnCa7
    6NVl8SV5aAYAvmOdkZBiurIYa1eHYYaDUGmOO8awTOXTfc4QzX75QwBUmcZeZKdj
    ZMPiJlm7Bsz/3Q1eolxHCqkAiDZIEohoT0o8Spw6+Eq8KcPnhf+K5+rIzJnWBZ9P
    tmpS4SEtrGHIfj3+638eqTydxuOCZ0Be9EanVK0ERav25fTRgRoZ+yEDiFP/MjQd
    rAgW7SyLOjm4I6bTmzjugmXf2Axm2kFuoyyZdrvdrJ+GBku5F6DOufGdGu13j80S
    lp148qh7gCREWrCqn3pH14qPKeHwC47jAQ3+ikRDfB090h9HGRi/8+w7Tx4=
    -----END CERTIFICATE-----

  • ACE Best Sticky Method for SSL Traffic

    Hi, With ACE 4710 running serverfarms primarily running SSL traffic, what is the best method for configuring stickiness. Here are some parameters:
    1) low volume sites, 2 real servers
    2) ACE _will not_ do SSL offloading
    3) Balancing HTTPS requests
    4) Many versions of HTTP clients
    5) Currently running ACE A1 code
    I am thinking of:
    1) TCP Header | HostID inspection
    2) SSL-session ID (not good if re-key often though)
    3) Any suggestions?
    many thx,
    WR

    Hi Will,
    You can see a comple configured example for your perusal in this regard for
    Configure ACE Module for End to End SSL Termination
    http://www.cisco.com/en/US/products/hw/modules/ps2706/products_configuration_example09186a00809c6f37.shtml
    And Many more here regarding
    Data Center Application Services Configuration Examples:
    http://docwiki.cisco.com/wiki/Category:Data_Center_Application_Services_Configuration_Examples
    Hope these configuration examples will be useful to you.
    Sachin Garg

  • Best Encoding method for decent quality but low file size

    Been trying to encode some mountain bike helmet cam footage which is fairly fast moving and looking for the best method for encoding at a decent quality without to much pixelation occuring. videos will be on my website so want file size to be kept quite low. website is www.extremesportsfilms.com if anyone is interested.
    Cheers

    Thank you, Harm !
    This is the first time in my carreer, that I've seen a qualitysetting that doesn't inflict on filesized
    I went in to set the bitrate diffently, but the field is grey'd out - it's not possible for me to change.
    It seems to be locked no matter what quicktime-format I choose. If I choose h.264 format insted, I CAN change bitrate, but I need to deliver in XDcam for this client.
    Is there no way for me to make the XDcam files smaller, then? They end up 5-7GBs for each show and with my upload-speed, it takes me 6-7 hours to upload and I would like to speed this up by decreasing the file sizes a little, if possible?
    Thanks

  • Clean Methods for adding HTML5 content to CP6?

    This seems to be a major missing piece of the mLearning wokflow. As far as I can tell the only viable methods for getting Hype/Edge/etc.. HTML5 animation content into a Captivate project are as follows:
    1. Convert animation to HTML5 compatible video file (not very slick and a file size hog, IMHO)
    2. Use a webpage widget to embed the animation from an external page (not a huge fan of third party dependencies)
    3. Add content after the fact using Dreamweaver or some other HTML editor (makes changes and revisions a multistep productivity nightmare)
    4. Use a beta tool that appears to have stalled out in development e.g, Lacuna (Brilliant name, BTW)
    Have any of the brilliant Captivate masters in this forum come up with any more favorable solutions? I seems so half baked that Adobe would allow CP6 to ship with "HTML5 support" but not allow HTML5 embeds. Am I completey missing something here?
    Cheers!
    -Ryan

    Thanks for the reply Jim. I have used your widgets in the past and I appreciate the work you have done. No ill will towards widget developers intended . I'm glad I didn't miss anything and this is truly the is the state of things.
    Seemed like sunch a simple thing to do, in concept, but in practice, not so much. Just the ability to add html code to a slide would be a major boon. (I agree about the current state of HTML5, but the most obvious application of this feature is for mobile devices where HTML5 support is far more widespread than the desktop segment)
    I was wondering though, with your experirnce in widget development: Would it be practical to create a simple widget that contains the animation and then place that?
    BTW, I have applied to beta that Lacuna app that you linked me too, but have heard nothing from the developers. Have you any insight as to the progress of that project?
    Thanks again,
    Ryan

  • Best cleaning steps for g4 processor and heat sink?

    I just pick up a dual 800 quicksilver cpu. What is the least expensive/best way to clean the die surfaces as well as the heat sink surfaces? Also does anyone know a link showing stable higher than originally rated speeds?

    Hi pheidius-
    The surface description is odd- I would expect it to be smooth (as all heatsink surfaces I have seen).
    You may be correct on the thermal pad. It would be the only logical explanation..... I've never really "dissected" a thermal pad before- just scraped them off and tossed 'em.
    If it is a thermal pad, you may have clearance problems with just thermal compound. This is, of course, dependant on the thickness of the previous pad......Just check the heatsink and it's contact on the processor after you have finished cleaning the thermal pad from the heatsink. It should be obvious if there will be clearance problems.
    Recommended removal proceedure for a thermal pad is to use a plastic card (like a credit card) or a plastic putty knife.
    When replacing thermal pads, after the old is completely removed, the heatsink surface needs to be heated until hot to the touch (use a heat gun), and then apply the new pad, pushing the pad on firmly and evenly.
    Note: When using thermal pads, wait until the heatsink and pad are cool before removing the protective paper and installing on the processors.
    If you end up using thermal compound, carefully apply the compound. Getting sloppy, and applying too much, especially with Arctic Silver, can cause problems. The compound is not just thermally conductive.......it is also electrically conductive.
    Back to the overclocking question- This article may be of interest.

  • Best cleaning method?

    Hi guys,
    My macbook screen is filthy! Full of fingermarks, dust and some scratches. Just wondered what you all think is the best way to clean the display? Just water and the cloth it comes with or use something more?
    Does the same also work for the case?
    Cheers
    Tom

    I like to use the spray stuff that is sold for eyeglasses. It has a little alcohol in it so that it evaporates without leaving streaks.
    As far as the case, I just use the cloth that came with my MacBook (I have the older plastic style though).

  • Best thread method for a chat server

    What would be the best way to thread a chat server in Java? I understand threads, but I'm new to java. I'm just looking for links to the appropriate classes not code. I already have the send/receive methods planed, but I'm interested in the best ways to pool the clients once connected.

    class: Thread
    interface: Runnable
    The two items above are what you need.

  • Best Migration Method for Exchange 2007 with multiple accepted domains

    We are trying to determine which method would be best for us as we migrate to O365.  Scenario as follows:
    1) Multiple accepted domains (each in their own OU in AD); example: domainA.com, domainB.com
    2) Exchange is 2007; clients will be upgrading the Outlook 2013
    3) Would like to be able to sync mailboxes starting anytime but be able to cut over a domain at a time.
    Tested so far with staged migration but it appears that with this, there is a change in the TargetAddress sending all mail to the O365.  Even changing MXs didn't redirect the message as it reaches the Exchange box and immediately goes to O365.
    We haven't tried the cutover as we're only able to test with the production box and if that somehow cutover the entire box, we'd be .. well, it wouldn't be good.  
    Anyone had any experience so that our #3 point would be doable, that would be great.  
    Thx
    George

    Hi George,
    According to your description, I understand that the issue is related to Exchange migration from Exchange 2007 to Exchange Online for Office 365. This forum focuses on some general discussion about Office 365 ProPlus which
    is the version of Office that comes with many Office 365 plans. Therefore, I suggest we can post the issue in Microsoft Exchange Online (Office 365) forum for more professional suggestions:
    http://social.technet.microsoft.com/Forums/en-US/home?forum=onlineservicesexchange
    Hope you can find the solution soon.
    Regards,
    Winnie Liang
    TechNet Community Support

  • Best update method for iOS: iTunes or built in updater

    What's the best method to update iOS software: iTunes (which downloads the whole thing) or the built in updater in the iOS? I've only used iTunes so far, but you always seem to have go through entering some info upon restart..

    Either one works fine. If you use Software Update in your iPhone then the system is upgraded in place. But be sure you have a good Internet connection and you have your phone connected to a charger for best results.

  • What are the best archiving methods for small colleges?

    Hi Folks,
    Im thinking a few terabyte hard drives will be my best option for a hundred dollars each.
    We have a small operation here at a New England college with two editing systems that get a good amount of student use and use by myself for college needs. Some of the student work will get deleted at the end of each semester, but I need to save all the college's video.
    What are the best ways to archive? Some of my concerns are cost and space. I can afford a few externals, do any of you have a nice cheap solution?
    I understand if I am to go the route of archiving on externals I should have a backup of my backup, do any of you guys have any feedback on ghosting your backups, is that common?
    thanks
    Mike

    If it's JUST for backup (not operation), you can get bare drives and either an enclosure for 1 or 2 drives with no tools trays (like the ones from Sansdigital: about $120 for a 1 drive enclosure) or a device like the UltraDock from Wiebetech (I use the latter). Physically install (or connect in the case of Ultradock) a bare SATA II 3.5" drive, connect it via USB 2, Firewire, esata, initialize/erase it, and then copy your files.
    Then store the drive carefully in the foil anti-static bag it came in a dry location where it won't get jostled about by errant students (or kids in my house).
    The savings in not getting full drive enclosures in the cost of multiple power supplies and interfaces. You pay for that once with the mountable enclosure / drivedock, and thereafter, just buy bare drives.
    I also like another reply: have the students provide drives on which to back up their projects. A friend of mine has a ProTools audio studio, and part of his "set up" charge, is $100 for a bare drive that he will archive for 5 years, or the client can take with him at the end of the project (when the bill is paid).
    Eddie O

  • Best authentication method for controlling DEVICE access to wlan

    Hello,
    I have a similar question to this thread ( https://supportforums.cisco.com/message/3927713 ) but I'm interested about device control on top of user control. Just like that thread, we are using WPA2-AES Enterprise with PEAP MSCHAPv2, which allow users to log on with their domain credentials. We wanted something simple for our users, so MSCHAPv2 with "single sign on" was optimal to us.
    Problem is, we have a new requirement and we need to implement it yesterday. We would like to allow only mobile devices and computers of our choice.
    Since we are using MSCHAPv2 which allow every domain user to connect using any device as long as their domain credentials are valid, is there a simple way to control this ?
    I guess we could go with MAC filtering, but we have about a thousand laptops. Not a big problem, we could do a regular MAC address inventory using SCCM. It's just that it looks like a brute force tactic to a simple problem. Would a Cisco ACE 4.1 RADIUS server tolerate well a MAC address table with a thousand entries ? What if it goes to two thousands ? Would this be easy to implement ? I'm a bit new to this, is there some documentation I could follow ?
    How do people usually do this in an elegant way ? How do you manage and control WLAN access to thousands of device ? I guess they go with TLS with certificates ?
    Thank you very much !
    Konnan

    Konnan,
    Just saw your PM:)
    Would it be possible to configure Access policies even if our Radius servers aren't joined to the domain ?
    > I really don't know... typically all my installs have the radius server joined to the domain.  I don't know what limitations you would have using the setup you currently are using.
    Still wondering if it would be a good path for us, because of the computer authentication issue where it happens only at logon in Windows if I read correctly and our users don't have the habit to log off frequently and we use only manual connection mode when the user already has his session open. I guess MAR will have to be set to a stupid high value... if it even works.
    > Well you need to sit down with everyone who is involved and really think out what works best for you.  Machine authentication works well, but then people wonder what happens if someone logs in that isn't authorized and that because the computer is a domain computer it automatically gets on the network.  Well your not going to get everything you want:)  So PEAP has issue because IT wants to limit the user to only be able to access using a company owned device... well, then ISE is your fix.  You can add a certificate that ISE can see and if that device has that or a registry value and the user is allowed to access the network, the authentication is allowed, or else it will not be.  EAP-TLS... well more work since you need a PKI infrastructure and both the radius and the clients need a cert...
    No matter what, you need to decide what works best and don't over complicate it with adding mac filter, etc.
    I'm wondering if EAP-TLS wouldn't be better for the long term, maybe with MAC Address restriction on the short term...
    > See above
    I'm also wondering if we could stay with PEAP MSCHAPv2 but use an NPS Radius server from Microsoft which allow to use complex policies instead of the Cisco ACS Radius server...
    > You need to know how to setup and configure the policies... either one will work, but if your on ACS 4.x, I would look at upgrading to 5.4.  ISE is replacing ACS as far as the radius portion, but tacacs isn't yet available on ISE.
    There's also the Cisco ISE, which seems to be equivalent to Microsoft NPS... a bit more costly OTOH.
    > ISE allows you to profile devices so you know what device is accessing your network.  Again, ISE is replacing ACS as far as the radius, but tacacs will soon be out and available for ISE.  If you really want to create crazy profiles, then ISE is the way to go.  You can specify that this user group is allowed wireless, but it has to be a domain computer.  The user isn't allowed access if its not a domain computer.  The same user group is allowed access with company iPads (certificate installed), but not have access with personal iPads, tablets or smartphones.
    Hope this helps.
    Thanks,
    Scott
    Help out other by using the rating system and marking answered questions as "Answered"

Maybe you are looking for