Does Macbook have a Right Fan?

Very excited to get my first Mac, its very ... shiny~. I noticed its always running at about 45 to 50 degrees celsius, so i got this Fan control program to boost the rpm of the fan. I noticed that the left fan rpm is changing as i change the settings, but the right fan rpm is always -1. Does MacBooks have a right fan? Should i be worried that the right fan rpm reading is -1?

As FM mentioned, there is only one fan in the MacBook. The MacBook Pro has two fans... which is why they show both in the app.

Similar Messages

  • This log in user does not have proper rights to use WebCenter Capture

    Hi experts,
    We have WCI 11.1.1.8.0 setup. It has WEC configured. However when I login with "weblogic" user. This is domain admin user. WEC allows user to login and shows top navigation bar. However in the body it shows below message
    "This log in user does not have proper rights to use WebCenter Capture"
    I am sure i have not gives a proper group/ role to this user. I am not sure which one is that.
    Regards,
    Vikrant Korde.

    Hi Vikrant,
    This happens if user is not in Capture Application Role.
    Check this:
    Log in to EM
    Right-click the capture_domain, select Security, and then Application Roles
    In the Application Stripe field, select capture, and then click the Search application roles icon to display the Capture application roles.
    In the Capture User add this weblogic.
    It will work now.

  • Macbook Pro 15" right fan making strange noise

    I have a mid 2012 15" Retina MacBook Pro, 2.3 Ghz with 8 GB of RAM running 10.9.4.  About 3 days ago it fell on to tile floor from about 10 inches off the ground and hit the floor at a 45 degree angle.  There was no damage except for a small scratch near and under the charging port.  Everything was working perfectly until a day ago when I noticed the right fan was making a strange high pitched humming noise.  It's very quiet, I can only hear it when there's no other noise but it is extremely irritating when I can hear it.  Other than the noise the fan works fine, it speeds up when when the computer gets hot, and in Temperature Monitor nothing gets hotter than it should be.  The computer works completely fine, but I'm wondering what could be making the noise.  Any help or suggestions would be greatly appreciated!

    Bump

  • Macbook pro 2012 - right fan suddenly broken.

    So i have a 7 month old Macbook pro, and all the sudden when i turned it on. the right fan started making the following noise: http://www.youtube.com/watch?v=IdQvf3WPKKA (not my movie)
    Is this still under the warrenty? Because i don't think the fan really needs to sounds like this.

    Ask the repair shop.   When you CALL AppleCare, request a loaner if the repairs will take a long amount of time.

  • Does user have admin rights to portlet?

    I have a portlet in which 2 groups have access, users of this portlet and admins of this portlet (not portal or community admins) They simply should get different functionality. Does the SettingType.Admin mean you are a portal/community admin or you have "admin" rights to the portlet?

    Neither.
    I'm guessing you're using the hasSettingsRight method of the IDK, no?
    if hasSettingsRight(SettingType.Admin) returns true it implies two things:
    1) You're in the admin prefs gateway and
    2) You have at least edit rights on the portlet object.
    HTH,
    Chris Bucchere | bdg | [email protected] | http://www.bdg-online.com

  • Does macbook have an anti virus sofware

    what anti-virus does macbook pro use

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to bypass Apple's oversight, or the oversight could fail in a particular case due to human error.
    For most purposes, applications recognized by Gatekeeper as signed, including App Store products, can be considered safe. Note, however, that at least one trojan for iOS (not for OS X) was briefly distributed by a developer in Russia through the iTunes App Store. That store is under the same oversight by Apple as the Mac App Store, so the protection shouldn't be considered absolute. App Store products may prompt for access to private data, such as your contacts. Think before granting that access. OS X security is based on user input. Never click anything reflexively.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications should not be trusted if they do something unexpected, such as asking for permission to access your contacts or your location for no apparent reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Does macbook have to have internal hard drive to boot?!

    As i'm having partition problems with the aftermarket hard drive installed in my macbook, I am resigned to re-partitioning it to install SL and restoring from time machine.
    However, the old stock hard drive I have is in a caddy, I kept it as a backup incase anything ever goes wrong, then I can just boot straight back into a copy of OSX 10.5, last night I managed to install SL on this drive etc,
    So i'm wondering is it possible to boot the macbook from the USB Snow Leopard drive, then at the same time in a seperate caddie, re-partition the other hard drive so I can perform a fresh installation?
    Complicated I know, but i've looked into other areas and it appears this is going to be the only way!
    Comments, advice and suggestions welcome

    I can confirm that the macbook does not need a internal hard drive to boot, I booted using the factory hard drive in a USB caddie, and then installed Snow Leopard via another USB caddie
    thanks for the help Matt

  • Does Apple have the right to remove music from my HDD?

    Not only are tunes I purchased missing from my library (the name, the duration, the artist, etc. are still listed) but also from my hard drive. I'd downloaded a free album and it appeared in my library for a while and then, after an recent update to iTunes, it and many other tunes are missing from my library and hard drive.

    I'm not sure that's the right question. For instance, when you sync an iPod, iTunes will be adding and removing files from the iPod's hard drive as a normal part of the operation. I'm fairly certain however, that the Software License Agreement that you acknowlegded when you installed iTunes will absolve Apple of liability for any loss of data that may occur directly or indirectly through the use of their software. It is your responsibiliity to back up any and all data that matters to you.
    When you say the files are missing, do you mean that there are entries in the library that come up with the exclamation symbol or that the entries themselves have been removed? Have you actually tried searching your hard drive in case these files not been migrated properly and are simply not where iTunes now expects them to be?
    *Adding new items/removing orphans*
    Try iTunes Folder Watch or iTunes Library Updater. Folder Watch is much faster on the adding files front, can be set to run in the background and includes a useful exclusion feature, however it’s really slow at removing orphans. iTLU is better for this although doing it manually after looking at a list of proposed removals generated by Folder Watch is probably faster still. iTLU can also be set to update iTunes when you've used 3rd party tools to change tag info.
    These tools can either be used directly or to guide you in the process of moving data to where iTunes expects to find it.
    tt2

  • Random songs in my music library will not play with an error message "computer does not have access rights" but this is not true. I do, and when I re-type the password, it tells me I already have access rights.  How do I fix this?

    When I try to play songs from itunes, I get an error message that my computer is not authorized.  My songs have all played in the past.  This is something new.  I verified my computer is authorized, and when I try to re-enter the password, it tells me that I am already authorized.  Makes no sense at all.  It's an endless circle.  Also, my shuffle will not sync due to access rights denied.  I did nothing new, I always take the updates.  My shuffle and compter are the same, no changes.  Everything is verified in my itunes account.  For some reason, it is blocking me from half of my music.  Help!

    It's an endless circle.
    See if these instructions help: iTunes repeatedly prompts to authorize computer to play iTunes Store purchases

  • Does Macbook have Virus protection, if yes, where can i find it on macbook?

    ive recently purchased a new macbook, i am unsure if it has virus protection already on it, or do i have to download it from someware?

    ive recently purchased a new macbook, i am unsure if
    it has virus protection already on it, or do i have
    to download it from someware?
    The OS is it's own Virus Protection. It's not that Apple computers are immune to viruses, just that (as I understand it), it is hard to create a "Unix" virus, and Unix is the underpinnings of Mac's OS.
    Apple also provides "security" updates now and then help protect the computer.
    I'm sure others can point out extra virus protection that you can download or buy if you want it. But for the most part, Mac's OS is, knock wood, highly virus resistant.
    Welcome to the World 'o Mac!

  • Content generation error - version string does not have the right format

    This is when trying to import an HTML article into an existing .folio. It's as basic an HTML page as I can make and it still be worthwhile (just divs & css). There's no spaces etc in any of my file names.
    This is the first time I've tried to import an HTML article.
    DPS details: version 12.2.4.20120611_m_691037
    8.0.7.21
    Windows 7
    Thanks in advance for any assistance.
    Simon.

    I have now encountered the same issue and fail to resolve it.
    After having tried every possible combination of folder structures (assets in local subdirectory, same root and moving everything into HTMLResources), trying various flavours of html (5, 4s, 4t) and turning my nose 90 degrees east while pressing "import"... the error persists.
    I am pretty sure that this has absolutely nothing to do with the content or structure of my HTML article. Heck, even a completely vanilla HTML file (valid of course) with a single line of text in the body and no styles, assets whatsoever: fails.
    It does work when importing it to a completely new folio though.
    Can someone please confirm that she/he is still able to import HTML articles to preexisting folio, after the latest folio builder panel update?

  • Document preview shows EDIT option even if someone does not have edit rights

    From what I can see, in the document preview panel in search results one of the options says "EDIT" even though the searcher only has read rights. Is this correct? If so is there a way of changing it so that it says "OPEN" if the document
    is read-only to the user?

    No way to change it that I am aware of.  For the most part MS doesn't impose a lot of permissions checking on links in dialogues.  To do that would require a lot of extra processing.
    Paul Stork SharePoint Server MVP
    Principal Architect: Blue Chip Consulting Group
    Blog: http://dontpapanic.com/blog
    Twitter: Follow @pstork
    Please remember to mark your question as "answered" if this solves your problem.

  • Distribution Point creation failed. possible cause : distribution manager does not have the sufficient access right to the computer

    Hi All,
    I had this really disturbing experience with
    SCCM 2012 SP1.
    OD : 2008r2 Enterprise 64bit 
    Possible cause: Distribution Manager does not have sufficient rights to the computer.
    Solution: Verify that the site server computer account is administrator of the computer.
    in Distmgr.log says :
    DPConnection::Disconnect: Revert to self
    SMS_DISTRIBUTION_MANAGER 5/26/2014 7:34:30 AM
    16280 (0x3F98)
    DPConnection::Connect: For ["Display=\\PNGBRANCHSERVER.xxx\"]MSWNET:["SMS_SITE=SSM"]\\PNGBRANCHSERVER.xxx\, logged-on as ssm\sccmadmin
    SMS_DISTRIBUTION_MANAGER 5/26/2014 7:34:30 AM
    16280 (0x3F98)
    DPConnection::Connect: For ["Display=\\PNGBRANCHSERVER.xxx\"]MSWNET:["SMS_SITE=SSM"]\\PNGBRANCHSERVER.x\, logged-on as ssm\sccmadmin
    SMS_DISTRIBUxxx ON_MANAGER 5/26/2014 7:34:30 AM
    16280 (0x3F98)
    Failed to find a valid drive on the distribution point ["Display=\\PNGBRANCHSERVER.xxx"]MSWNET:["SMS_SITE=SSM"]\\PNGBRANCHSERVER.ssm.com.myx
    DPConnection::Disconnect: Revert to selfxxx
    MS_DISTRIBUTION_MANAGER 5/26/2014 7:34:30 AM
    16280 (0x3F98)
    DPConnection::Disconnect: Revert to self SMS_DISTRIBUTION_MANAGER
    5/26/2014 7:34:30 AM 16280 (0x3F98)
     GetContentLibLocation() failed SMS_DISTRIBUTION_MANAGER
    5/26/2014 7:34:30 AM 16280 (0x3F98)
    Failed to get the content library path on server PNGBRANCHSERVER.  SMS_DISTRIBUTION_MANAGER
    5/26/2014 7:34:30 AM 16280 (0x3F98)
    Failed to install DP files on the remote DP. Error code = 16389
    SMS_DISTRIBUTION_MANAGER 5/26/2014 7:34:30 AM
    16280 (0x3F98)
    STATMSG: ID=2370 SEV=E LEV=M SOURCE="SMS Server" COMP="SMS_DISTRIBUTION_MANAGER" SYS=SCCMSVR. SITE=SSM PID=2660 TID=16280 GMTDATE=Sun May 25 23:34:30.428 2014 ISTR0="["Display=\\PNGBRANCHSERVER.ssm.com.my\"]MSWNET:["SMS_SITE=SSM"]\\PNGBRANCHSERVER.\"
    ISTR1="PNGBRANCHSERVER.S" ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=1 AID0=404 AVAL0="["Display=\\PNGBRANCHSERVER.\"]MSWNET:["SMS_SITE=SSM"]\\PNGBRANCHSERVER.ssm.com.my\"
    SMS_DISTRIBUTION_MANAGER 5/26/2014 7:34:30 AM
    16280 (0x3F98)
    I have tried many of the solution provided unfortunately nothing positive happened.
    Appreciate your input before engaging premier support.
    Thank you

    Hi,
    NO_SMS_ON_DRIVE.SMS
    This file is used to prevent Configuration Manager from installing binaries to a volume. By default, when you install System Center 2012 Configuration Manager on a remote Site System, the SMS Site Component Manager Service installs the binaries (files and
    folders) for the Site System on the NTFS-formatted volume that contains the most free space. You may want to use an NTFS volume other than the default volume for your remote Site Systems by preventing ConfigMgr from enumerating certain NTFS volumes.
    In order to prevent CM from enumerating an NTFS volume, on the remote server you can create a text file that is named NO_SMS_ON_DRIVE.SMS and put the this file on the root folder of all NTFS volumes where you do not want to install the binaries (SMS folder)
    for the ConfigMgr components.
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Characteristic doesnt have the right internal format

    Hi,
    I am trying to load an infoobject I m getting the following errors
    1. Value 'USBN019900000000000011503 ' for characteristic ZHMAT_SLS does not 
    have the right internal format                                           
    2. Diagnosis                                                                               
    Data record 677 & with the key 'USBN019900000000000011503 &' is invalid in value 'USBN019900000000000011503 &' of the attribute/characteristic    ZHMAT_SLS &.                                                                               
    System response                                                                               
    The system has recognized that the value mentioned above is invalid, and    has processed this general error message. A subsequent message may give you more information on the error. This message refers to the same
        value, even though it does not state this explicitly.                                                                               
    Procedure                                                                               
    If this message appears during a data load, maintain the attribute in
        the PSA maintenance screens. If this message appears in the master data maintenance screens, leave the transaction and call it again. This allows you to maintain your master data.                                 
    Can someone let me know how to solve this,
    Thank you.

    Hi,
    As a short term fix edit the record in PSA and update it again.
    I think you can edit the data record "USBN019900000000000011503 &" to "USBN019900000000000011503" (removing space and &) in PSA.
    It should work.
    This issue can be resolved by correcting the error records in PSA and updating it into the target. For that the first step should be to identify if all the records are there in PSA. You can find out this from checking the Details tab in RSMO, Job log , PSA > sorting records based on status,etc. Once its confirmed force the request to red and delete the particular request from the target cube. Then go to PSA and edit the incorrect records (correcting or blanking out the invalid entries for particular field InfoObject for the incorrect record) and save it. Once all the incorrect records are edited go to RSA1>PSA find the particular request and update to target manually (right click on PSA request > Start update immediately).
    I will add the step by step procedure to edit PSA data and update into target (request based).
    Identifying incorrect records.
    System wont show all the incorrect records at the first time itself. You need to search the PSA table manually to find all the incorrect records.
    1. First see RSMO > Details > Expand upate rules / processing tabs and you will find some of the error records.
    2. Then you can go to PSA and filter using the status of records. Filter all the red requests. This may also wont show the entire incorrect records.
    3. Then you can go to PSA and filter using the incorrect records based on the particular field.
    4. If this also doesnt work out go to PSA and sort (not filter) the records based on the particular field with incorrect values and it will show all the records. Note down the record numbers and then edit them one by one.
    If you want to confirm find the PSA table and search manually."
    Also Run the report RS_ERRORLOG_EXAMPLE,By this report you can display all incorrected records of the data & you can also find whether the error occured in PSA or in TRANSFER RULES.
    Steps to resolve this
    1. Force the request to red in RSMO > Status tab.
    2. Delete the request from target.
    3. Come to RSMO > top right you can see PSA maintenace button > click and go to PSA .
    4.Edit the record
    5. Save PSA data.
    6. Got to RSA15 > Search by request name > Right click > update the request from PSA to target.
    Refer how to Modify PSA Data
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/40890eda-1b99-2a10-2d8b-a18b9108fc38
    Thanks,
    JituK

  • Does a macbook air have a right-click?

    does a macbook air have a right-click?

    Yes, Look in System Preferences > Trackpad > Secondary click
    Edit: For additional options, click the down arrow next to the click or tap with two fingers.

Maybe you are looking for