Does live 24 bit do digital sound? and what do you n

just like the subject says.

VTry connecting the sound card to another USB port on the computer, preferably the USB ports found at the back of the computer. You can also try using Windows generic drivers to see if it makes a difference. I don't think there is any more new development for this product since it has already been classified as 'End of Service Life'. ?

Similar Messages

  • I am considering buying a new MAC laptop to run LOGIC for composition and band live/recording, but which one is best as I do not want to spend too much money? Does it have a line in and how do you monitor sound? Will I need adaptors and a interface?

    Can anybody help?
    I am considering buying a new MAC laptop to run LOGIC for composition and band live/recording, but which one is best as I do not want to spend too much money?
    Does it have a line in and how do you monitor sound?
    Will I need adaptors and an interface?
    Also, I am guessing as Logic only runs on MAC surely then they would not the best spec to recommend to run it?
    I see all the upgrades as additional memory or a faster process?
    Is a retina screen necessary, and why flash based storage against a 1TB hard drive, and a i5 instead of an i7
    The main reason for this purchase is to play live and use backing tracks and record found sounds and make creative songs.
    I hope you can provide some valuable feedback, as I am a longtime MAC user and see upgrades and changes happen regularly but the most important thing is the songs not the equipment.
    I have £500 already and willing to add another 500 to 700 pounds, then software extra.

    Can anybody help?
    I am considering buying a new MAC laptop to run LOGIC for composition and band live/recording, but which one is best as I do not want to spend too much money?
    Does it have a line in and how do you monitor sound?
    Will I need adaptors and an interface?
    Also, I am guessing as Logic only runs on MAC surely then they would not the best spec to recommend to run it?
    I see all the upgrades as additional memory or a faster process?
    Is a retina screen necessary, and why flash based storage against a 1TB hard drive, and a i5 instead of an i7
    The main reason for this purchase is to play live and use backing tracks and record found sounds and make creative songs.
    I hope you can provide some valuable feedback, as I am a longtime MAC user and see upgrades and changes happen regularly but the most important thing is the songs not the equipment.
    I have £500 already and willing to add another 500 to 700 pounds, then software extra.

  • Does iPhone 5 support digital sound? (to slink)

    Does iPhone 5 support digital sound? (to slink)
    Is there any information about accecories for this?

    Cambridge Audio offers an iPhone dock with a TOSlink output:
    http://www.cambridgeaudio.com/products/id100-digital-dock-for-ipad-iphone
    They don't say whether it supports the iPhone 5, but you can ask. Streaming through an AirPort Express may work as well and would definitely be less expensive, though.
    Regards.

  • What is causing this problem and what are you doing to fix it? Should I just go back to Internet Explorer?

    Every single day, Firefox crashes and sometimes in the most inopertune time. This is very frustrating as some of the times I can not go back in and correct what I was not able to do due to your site crashing. What is causing this problem and what are you doing to fix it? Should I just go back to Internet Explorer?

    First, you must use a specific [[Managing profiles|profile]] for Firefox 4.0 Beta and keep your current one for Firefox 3.6 to prevent interferences between the two versions.
    For your problem:
    # [[Troubleshooting extensions and themes]] could be a cause.
    # If not 1. and if it does not happen in [[Safe Mode]], you must disable HW acceleration in Options > Advanced > General. If it solves your issue, your graphic driver is out-of-date and must be updated. Go to your computer manufacturer support site.

  • HT3529 I'm having trouble with my iPhone 5 iMessage service. The device does not recognize the users who have iMessage when I try to contact them using this feature. Who have the same issue and what did you do in order to solve it?

    I'm having trouble with my iPhone 5 iMessage service. The device does not recognize the users who have iMessage when I try to contact them using this feature. Who have the same issue and what did you do in order to solve it?

    Read here:
    http://support.apple.com/kb/ts2755

  • What application does an iMac come with that lets you see the core of its system, and what would you look for to determine if malware was on it?

    What application does an iMac come with that lets you see the core of its system, and what would you look for to determine if malware was on it?

    This extension?
    *FireBug: https://addons.mozilla.org/firefox/addon/firebug/
    Firefox 4 also has a build in inspector: Firefox > Web Developer > Inspect

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I am trying to reinstall Itune and it wont install because my computer says it has a virus. Anybody had this happen and what did you do?

    I am trying to reinstall itunes and it won't install because my computer says it has a virus. Anybody had this problem and what did you do?

    See the further information area of Troubleshooting issues with iTunes for Windows updates for direct download links. Try again.
    tt2

  • I have an iphone 5s and i just got the 7.0.4 update. Now i don't have the option to have a fingerprint scanner. Has anyone had this same problem? If so, why is that and what did you do about it?

    I have an iphone 5s and i just got the 7.0.4 update. Now i don't have the option to have a fingerprint scanner. Has anyone had this same problem? If so, why is that and what did you do about it?

    I have an iphone 5s and i just got the 7.0.4 update. Now i don't have the option to have a fingerprint scanner. Has anyone had this same problem? If so, why is that and what did you do about it?

  • HT201269 I have an iphone 4 and the screen is jumpy and after a liitle while the colors change, has anyone else had this happen and what did you do (if anything) to fix it?

    I have an iphone 4 and the screen is jumpy and after a liitle while the colors change, has anyone else had this happen and what did you do (if anything) to fix it?

    Read: http://support.apple.com/kb/TS4436
    It is pretty short so here is the entire text:
    Symptoms
    A purplish or other colored flare, haze, or spot is imaged from out-of-scene bright light sources during still image or video capture.
    Resolution
    Most small cameras, including those in every generation of iPhone, may exhibit some form of flare at the edge of the frame when capturing an image with out-of-scene light sources. This can happen when a light source is positioned at an angle (usually just outside the field of view) so that it causes a reflection off the surfaces inside the camera module and onto the camera sensor. Moving the camera slightly to change the position at which the bright light is entering the lens, or shielding the lens with your hand, should minimize or eliminate the effect.
    Which is exactly what eelw wrote.
    No one on Apple Support Communities has authority to speak on behalf of Apple, unless their avatar is accompanied by this Apple image:
    ... identifying themselves as Apple employees.

  • What does this mean, and what do you do about it?

    So what does it mean? And what can be done about it? I really, really loathe restoring because the software is so appalling bad that every app location as to be reassigned and rebuilt. It always ends up being hours of work, but I have to say the new iOS is very junky.
    Any suggestions are much appreciated.
    When I go to see the apps on the phone I get this
    I'm thinking this is not a good thing. It never resolves itself and gets loaded. From kaka software.
    Message was edited by: Tom Wolsky

    The reason why JJ asked what "something" is, is because a smart object means something different to a shape layer, a converted layer, a camera raw image, a movie animation, 3D object, etc. And therefore converting one way and back changes on its type with some of them very difficult or not able to reverse.
    Example: A layer can be converted to a smart object by right clicking on its layer and selecting smart object in the menu, at this point most filters can be used in a non-destructive way, in that it is very easy to edit the filter later on. This layer can then be rasterized by using the same menu, which renders that layer as a bitmap image, anything that was in that layer is no longer editible in the sense of quick editing, for example text would be just an image not live text.
    If you merge the layers or flatten the layers, the same thing happens, all the layers become a single bitmap layer. Howerver if some of the layers are hidden or certain layers are selected, then other merge options are available, such as the ability to merge only visible layers or merge selected layers and leave the rest alone.
    OK, I have gone into a fair amount of detail, if you have any questions let us know...

  • How much info about the cache-cluster does the client have and What would you recommend about putting the cluster behind virtual ip

    Hi,
    I will appreciate if someone can point me to some documentation as to how app-fabric client library accesses the app-fabric cluster.
    What I have found so far is that the list of hosts provided in the client configuration are used as an entry point into the Cache-Cluster. By connecting to one of hosts, the client will download information about all the hosts constituting the cluster.
    Since a named cache is distributed across the entire cluster, and the data can be stored on any node. How does the client decide which node it should connect to, to get the data from. Does the client have enough information to know which host has the data
    or the client will connect to one of the nodes, if the node has data, it will serve it otherwise redirect the client to the node that has the data.
    I also would like to know what do you say about the idea that we would like to put our cache-cluster behind a virtual ip, so that if needed, we can take down nodes or add more nodes. In fact the virtual ip will that of a load balancer, but we don't plan to
    use it for load balancing purposes but the idea is that the client will have the virtual ip address and we can repoint this IP address, if we need to take out a node for maintenance reason. 

    I'm not sure about the reason for putting the cache servers in a VIP, but one of the reasons why the cache servers should be made known to the servers is because of auto load balancing and throughput
    Imagine i have 10 cache servers running on 1G ethernet links, theoretically i have 10G usable bandwidth and the clients will be able to manage and load balance if any of the cache server fails or have performance issues
    Now if all these were parked behind a VIP
    1. The LB now does the load balancing, which may not be optimal
    2. The LB may not have 10G upstream and 10G downstream, even if it has, this is quite a waste of resource\

  • When does IOS 7 come out? And what model iPhones can download it?

    When does IOS 7 come out and what iPhones is it available for?

    Those questions can be answered by going to http://www.apple.com

  • I´ve bought the new IPad3, what a disappointment the 3G does not work, no Internet available, APPLE what are you doing for the all the people in Germany who bought the new IPad3? I´m still an Apple fan, all my products are from Apple but I need a solution

    I have been waiting since months for the new IPad4G 64 Gbt. ON recommendation of Apple Support I have changed my IPad 4G last week in the hope that something was wrong with the firts one I bought.
    The one I have now has the same problems. WiFi is working however 4G not at all. Apple what can I do? What are you doing for the thausands of German Apple fans who have bought a IPad4G and can not use it. We need a solution NOW. I´m working with this tool and need to be able to rely on it.
    Thanks for a feed back.

    JKerki wrote:
    They had not heard about the problem, however made no problem to change it for an other one. Apple Support Germany pretendet not to know about this problem. However the web is full of complaints.
    It would be advisable for Apple to react officially on it. € 799, - for something that doesn´t function is no fun :-((
    Isn't replacing your iPad Apple "officially" acting on it?

  • Has anyone gone from a camera similar to the SX200 to the G15 or G16 and what have you thought?

    I have the SX 200 and am not satisfied with the reaction time.
    I am looking into the G16 but am reluctant to spend $450 on it 
    not really knowing if it is worth it.
    Has anyone gone from a camera similar to the sx200 to the g16 and was
    it worth it?
    thanks
    Karen

    I assume you're shooting his swing which is a form of action photography. If I'm right the best way to improve your results is to improve your technique, which costs nothing but takes a bit of thinking & practice. Thinking because you need to understand what settings fit the situation & how to set the camera to them. Technique comes into play when it comes to holding the camera STEADY, which is rarely done while using the LCD to frame the shot if hand holding. I don't own either of your choices but have a G9 which I've used for years but mostly as my underwater camera but even it would be an improvement over your SX200. The SX200 has a "slow" lens (f3.5 max aperture) while the G16 has f1.8 which is twice as fast (requires half the light all other settings being the same) which means under the same lighting conditions the G16 will use a shutter speed that's twice as fast as the SX200 would. Right now you only get 1 FPS (frame per second) while the G16 can do from 6 to 12 FPS depending on settings & having good light. More importantly it has a viewfinder (electronic) which allows you to hold it against your face to frame & time the shot AND keeps it more stable. You would however loose some of your current lens reach because the G16 only has about 1/2 the telephoto reach.
    If you take the time to read these articles I've wrote for a couple of other forums I belong to it might help you understand why things work the way they do & why developing technique is the key to better photos.
      http://www.tripadvisor.ca/ShowTopic-g150809-i66-k1635038-Understanding_your_digital_camera_the_basic...
    http://www.rccanada.ca/rccforum/showthread.php?t=147971
    "A skill is developed through constant practice with a passion to improve, not bought."

Maybe you are looking for

  • Showing images in a GUI

    Hi there i was wondering if i could ask for some assistance. I have written a system that will read in a file and modify its pixel content and then write the new image to file. i now want to develop a gui that will allow me to show the initial image

  • Urgent ! UWL configuration file

    Hello experts, Is it possible to create a new UWL  connector which can lauch all mails in CRM inbox  with modify the exist connector? If it's possible , how to do it ? Thank you. BR, Jianguo Chen

  • BI beans does not use QUERY RERWITE for cube

    Hello! First of all I would like to say big thanks to Keith for help on dimension rollup. It works now. I am creating a pilot environment with Oracle      10.2.0.3 OWB 10.2.0.3 SS Add-in 10.1.2.2 and one cube ST_R and three dims DIM_R_NOMA for produc

  • Hyperlink in Acrobat

    From Quark, I am creating (save as pdf) a pdf file. I am then opening it up in Acrobat. I there a way for me to create/save the email addresses as a hyperlink? Thanks...

  • Cisco ISE sponsor Portal email notification of guest account

    Is there anyway to not have the email button be displayed in the sponsor portal?  We don't have email or SMS enabled and sponsor users are complaining that the button is there but doesn't work, it woul be really good if you could just remove it.  I h