Getting a macbook pro, what to do??

i have a choice. i want to edit a short documentary i shot on hdv at 1080i. i'm going to get a macbook pro to use going forward for this and other smaller video projects. the brand new mbp came out yesterday, and to get what i want, it's around $3700.
Now there is refurb on the apple site with 2.4ghz drive, 2gb ram, 160gb HD (5400). which i can get or about $2800, with applecare/fce.
i could save $1,000 with the refurb. but am i going to miss out on much? the differences:
2.4 vs. 2.5 ghz
180gb hd (5400) vs 200gb hd (7200)
regular screen vs. high res screen
video card 256 vs. video card 512
i'm planning on using external drive anyway (7200)...not sure what a 'scratch drive' is and how the workflow would be, thinking just store main clips on external and work on edits on internal?

For HD video on a MacBook Pro, you want the fastest machine you can afford. The refurb's are tempting as are several online deals of the previous generation- it all comes down to your budget.
The 7200 RPM internal drive will make a big difference in everything you do with video. Just get it- 5400 will drop frames sooner or later and you will be sad. but be sure not to fill it up or it will be slow- offload everything you can to your external drive.
The new 512 video card will help with Motion projects especially, as well as other heavily GPU dependent software such as Aperture. Even the 2.6 upgrade from 2.5 will make a difference- it just depends on your budget. Given that Macbook Pro's are not very upgradeable other than replacing the entire unit, i like to buy top of the line for my video production use.
As for the hi-res screen it's great for editing if your eyes are up to it. The best timeline experience you can have on a laptop!
That being said, i just ordered a 15 for the portability since I shoot with an HVX200 and I need to offload P2 cards in the field. My 17 HD/2.4 is great but it's a tank! Everything's a trade off in the portable arena... but what a delicious decision to have to make. Have fun with it!

Similar Messages

  • Getting new MacBook Pro, what to look for once i get it?

    i'm moving to Oahu next month, and selling everything to make the move easier. one thing going is my PowerMac G5 Dual 2.0 with 20" ACD, which i'll be selling soon. so....
    i bought a new 15" MacBook Pro 2.16 off ebay as 'new, sealed in box'
    just wondering what things i should check for when i get it, in regards to a lot of the problems, etc i've been reading about here.
    thanks

    Brian, if you look at posts in this discussion forum you will see a number of complaints about the MacBook Pro. If you look at any other Mac model discussion forum you will see a number of complaints about each model.
    I have no doubt that some owners have problems, as no consumer device as complex as a computer can be made with zero defects at consumer-affordable prices, if only because they are assembled from many parts, each of which has a tolerance range in its specifications.
    My week 12 MBP is perfect. Fast, stable, quiet, perfect screen, perfect fit & finish, good WiFi connectivity and no heat problem. It's been working hard since March 30, 7 days a week. So I have to give Apple an A+ for design, engineering, assembly and QA.
    We don't know the actual percentage of MBPs that have had problems. MacNN did a recent survey and reported that about 16% of MBPs had problems requiring service. That's higher than normal, but such polls tend to over-select for problem reports. The major complaint has been about heat, but IMHO heat isn't really a hardware problem for the MBP.
    The other major complaint has been a "whine" noise associated with CPU circuitry. Some MBPs are noisy enough to be irritating, especially on battery power. There are user workarounds, but Apple has announced a logic board replacement that can minimize such problems. Mine doesn't whine.
    Some people have had assembly problems such as misaligned cases, poorly installed keyboards and what not. Inevitably, a very small percentage of hard drives will fail early -- that's the nature of the beast, even though most hard drives will probably operate beyond their specified operating life.
    The odds are that you won't have problems; but if there is a hardware defect Apple has been very responsive and has a good reputation for trying to satisfy customers.
    If your computer qualifies for AppeCare, I would recommend it, as that adds two years to the warranty coverage -- and repairs on a notebook can be expensive. I've bought AppleCare for all my notebooks, and have never had to have any of them serviced.

  • Well i am going to get a macbook pro non-retina should i get 4gb or 8gb i asked because i have lots of files and i play and record games what gb should i do?

    i have to get a new computer i want to get a macbook pro non retina but i use my computer alot with school i have lots of files and picture but what should i get 4gb or 8gb

    You need storage space for your files. You need RAM in order to run programs. They are not the same.
    1. Get 8 GBs of RAM.
    2. Get a large hard drive or SSD to store your files. The bigger, the better.

  • After the last Yosemite update on my MacBook pro I turned the FileVault on, now my Mac is freezing all the time and encrypting the drive looks like going to last forever and I am unable to use my MacBook pro what must I do???!!!

    after the last Yosemite update on my MacBook pro I turned the FileVault on, now my Mac is freezing all the time and encrypting the drive looks like going to last forever and I am unable to use my MacBook pro what must I do???!!!

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can act on it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*genieo\* \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 "` route -n get default|awk '/e:/{print $2}' `" 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB ' com.adobe.AAM.Updater-1.0 com.adobe.AAM.Updater-1.0 com.adobe.AdobeCreativeCloud com.adobe.CS4ServiceManager com.adobe.CS5ServiceManager com.adobe.fpsaud com.adobe.SwitchBoard com.adobe.SwitchBoard com.apple.aelwriter com.apple.AirPortBaseStationAgent com.apple.FolderActions.enabled com.apple.installer.osmessagetracing com.apple.mrt.uiagent com.apple.ReportCrash.Self com.apple.rpmuxd com.apple.SafariNotificationAgent com.apple.usbmuxd com.citrixonline.GoToMeeting.G2MUpdate com.google.keystone.agent com.google.keystone.daemon com.microsoft.office.licensing.helper com.oracle.java.Helper-Tool com.oracle.java.JavaUpdateHelper com.oracle.java.JavaUpdateHelper org.macosforge.xquartz.privileged_startx org.macosforge.xquartz.startx ' ' 879294308 4071182229 461455494 3627668074 1083382502 1274181950 1855907737 2758863019 1848501757 464843899 3694147963 1233118628 2456546649 2806998573 2778718105 2636415542 842973933 2051385900 3301885676 891055588 998894468 695903914 1443423563 4136085286 523110921 3873345487 ' 51 5120 files );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' s/[0-9A-Za-z._]+@[0-9A-Za-z.]+\.[0-9A-Za-z]{2,4}/EMAIL/g;/faceb/s/(at\.)[^.]+/\1NAME/g;/\/Shared/!s/(\/Users\/)[^ /]+/\1USER/g;s/[-0-9A-Fa-f]{22,}/UUID/g;' ' s/^ +//;/de: S|[nst]:/p;' ' {sub(/^ +/,"")};/er:/;/y:/&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: (E[^m]|[^EO])|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Genesy|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<10) print "com.apple.";} ' ' { sub(/ :/,"");print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/{next};/(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { split("'"${p[41]}"'",b);split("'"${p[42]}"'",c);for(i in b) print b[i]".plist\t"c[i];if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/{next};/%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";p="uniq -c|sed -E '"'s/ +\\([0-9]+\\)\\(.+\\)/\\\2 x\\\1/;s/x1$//'"'";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]$1|p;b=b$1;} END { close(p);if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"cksum "F|getline C;split(C, A);C="checksum "A[1];"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text(, with v.+)?$|(Bo|PO).+ sh.+ text ex|XM)/) F=F" ("T", "C")";else F=F" ("C")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' s/^ ?n...://p;s/^ ?p...:/-'$'\t''/p;' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9|"sort|uniq";} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' "`S0 44 45`" ' BEGIN{FS="= "} /Path/{print $2} ' ' /^ *$/d;s/^ */   /;' ' s/^.+ |\(.+\)$//g;p ' '/\.(appex|pluginkit)\/Contents\/Info\.plist$/p' ' /2/{print "WARN"};/4/{print "CRITICAL"};' ' /EVHF|MACR/d;s/^.+: //p;' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps crontab iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl smcDiagnose sysctl\ -n defaults\ read stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' pluginkit scutil dtrace profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil lsof test osascript\ -e );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' "'tell app \"System Events\" to get properties of login items'|tr , \\\n" 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$(RefProc): \$Message' -k Sender Req 'fsev|kern|launchd' -k RefProc Rne 'Aq|WebK' -k Message Rne 'Goog|ksadm|probe|Roame|SMC:|smcD|sserti|suhel| VALI|ver-r|xpma' -k Message Req 'abn|bad |Beac|caug|corru|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|NVDA\(|pagin|proc: t|Roamed|rror|SL|TCON|Throttli|tim(ed? ?|ing )o|WARN' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cght] ! -name .?\* ! -name \*ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '/S*/*/Ca*/*xpc* >&- ||echo No' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,Ex}* {/,}L*/{A*d,Ca*/*/Ex,Co{mpon,reM},Ex,In{p,ter},iTu*/*P,Keyb,Mail/B,Pr*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -path \\*s/Resources -prune -o -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,mach_i*/*,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t {/S*/,/,}L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' '+c0 -i4TCP:0-1023' com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' "+c0 -l|awk '{print(\$1,\$3)}'|sort|uniq -c|sort -n|tail -1|awk '{print(\$2,\$3,\$1)}'" -m 'L*/{Con*/*/Data/L*/,}Pref* -type f -size 0c -name *.plist.???????|wc -l' kern.memorystatus_vm_pressure_level '3>&1 >&- 2>&3' " -F '\$Time \$Message' -k Sender kernel -k Message CSeq 'n Cause: -' " );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents XPC\ cache Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA Descriptors App\ extensions Lockfiles Memory\ pressure SMC Shutdowns );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};A'$((7+i))'() { v=` eval sudo "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};';done;A9(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0() { [[ "$v" ]]&&sed -E "$s"<<<"$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v"|sed -E "$s";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "${s[63]}"<<<"$v"`&&C1 1 $1;};for i in 1 2 7 8;do for j in 0 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;D20 0 $((N1+1)) 2;D10 0 $N1 1;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;B1&&D73 19 53 67 55;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 54 12 56;D23 5 14 12 14;D22 6 36 13 15;D22 20 52 66 54;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D82 35 49 61 51;D82 11 17 17 20;for i in 0 1;do D82 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A8 18 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;B3 4 0 65;A3 14 6 32 0;B4 0 16 11;A1 26 50 64;B7 16;C3 52;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D73 21 0 32 19;D73 10 42 32 40;D82 29 35 46 39;};D23 14 1 62 42;D12 34 43 53 44;D12 22 20 32 25;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 21 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D83 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 10 42 32 41;D13 37 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 21 48 49 49;B3 4 22 57;A1 21 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D12 4 51 32 53;D23 22 9 37 7;A9;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return  three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report what happened. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • How do I get my Macbook Pro to stream?  It is about 1 year too old.

    How do I get my Macbook Pro to stream?  It is about 1 year too old.

    Depending upon the available ports on your MBP you will need an adapter and an HDMI cable to connect to your TV (unless it is an older model). 
    These are example of an adapter and an HDMI cable:
    eshop.macsales.com/item/NewerTech/CBLMDPHDMI/http://
    http://eshop.macsales.com/item/MISC/CBLHDMI1406/
    One can find a single cable that combines the two.
    Since you have not indicated what MBP you have and the TV connections that are available, these may or may not be applicable in your situation.
    Ciao.

  • How do I get my MacBook Pro to recognize my Toshiba external hard drive?

    How do I get my MacBook Pro to recognize my Toshiba external hard drive? I'm working on transferring my music from our home computer to my new laptop and I already got all my music onto the hard drive but now, when I plug it into my MacBook Pro, it doesn't recognize it. There isn't an icon that pops up and nothing happens at all. The blue light on the hard drive that indicates that it knows it is plugged into something comes up but that's about it. Someone told me I might have to "format" it but I don't know what that means and I don't know how to do it. I just want to get my music from the hard drive to my laptop so please help!

    natgray17 wrote:
    I don't know about your first question... I went to finder, preferences, then general but I didn't see anything for the hard drive. 
    Huh, in the Finder menu, Preferences, you will see this:
    Nope, disk utility cannot see it. I've tried unplugging it and plugging it back in but it still won't recognize it.puter that's a Mac...
    If DU cannot see it then the preferences is just an academic exercise.
    If this is a USB drive then as mentioned above you may need a powered USB hub since there may not be enough power from the USB to run the drive.  What else do you have plugged into the USB ports?  If there's some stuff you can unplug it then do it and see if your drive mounts.
    What do you mean from a Windows machine? It's a Toshiba hard drive and I put my music on it from my home computer that's a Mac...
    Which is all I wanted to know, i.e., whether the drive came from a Winows machine.  So it's been formatted and created on a mac.  Therefore it should mount on this other mac machine.  So it most likely is a power problem.

  • How do I get my MacBook pro to play on my tv?

    How do I get my MacBook pro to work on my tv. I have the correct cables to connect it. I just keep getting the mac screensaver showing?

    You don't. The HDMI socket on your MacBook Pro is an output, not an input.
    What content source are you wanting to view? Your MacBook Pro may be able to view it directly.

  • I'd like to get a new computer but I'm not certain about getting a Macbook Pro vs a Windows PC Helpppppppppppp

    I'm shopping for a new computer.  I've been a Windows user for a long time now.  I've been shopping for a laptop so I can be portable.  I really like the design and features of the Macbook Pro with Retina and it would do what I need it to do for audio recording and other things musically.  I've been told by musician friends that its much easier to work with a Macbook Pro when it comes to audio recording, photos, and movie making.  I've read this in many articles online as well.
    I'm convincing myself more each day to get a Macbook Pro, but that reservation keeps holding me back because of my Windows experience.  I know I can purchase Parallels or VMWare Fusion 5 and run Windows so what I am worried about it? lol
    I'd like to read some feedback on those Mac users that converted over from Windows.  How has your experience been with a Macbook Pro?  I like the idea that Apple will be bringing the manfacturering of their systems to the USA.  I also like the fact that Apple does their own research to build great products for all consumers to enjoy.  I guess that's why the products cost so much.  You're paying for care and quality.
    Ok Mac users honestly convince me that I'm making a solid and sound decision by diving into a Macbook Pro.
    Thanks and take care,
    L

    I have used PCs for years, and still do at work.  But, last year my wife bought me a 15" MBP with the anti-glare screen (I was getting ready to buy for myself).  It took me all of 1 week to completely get used to the UI for OS-X, and now I really prefer it over the Win7 UI.  I have no experience with Win8.  Here are my thoughts:
    1) You can get a good computer using either a Win8 machine or a Mac.
    2) You will pay less for an equivalent PC.  But not as much less as some would have you believe.  You need to take into account the all aluminum body of the Mac (vs most PCs being plastic) and the size of the display.  And, don't forget that there is a lot of bundled SW on the Mac that you will actually find useful and would have to purchase for the PC.
    3) You can probably do everything you need on the PC platform with the right SW (you probably already know this since you are using one already).
    That said, I think some things are easier on the Mac.  For example, GarageBand is a standard part of the Mac SW installation.  I got up and running recording directly from my bass into a track with a song imported from iTunes on another track in a snap.  I only had to purchase a Jam adapter ($99) for the bass so I could come in over USB instead of using the audio in port (which did work, by the way).  You can do the same on a PC, but you have to purchase the SW from somewhere.  And, it probably isn't cheap.
    I use VMware Fusion to run those Win programs I already owned because it was much less expensive to buy Fusion than to replace them.
    I would not return to a PC for my own use, given a choice.  But, I would be very careful about getting my wife a Mac without careful thought as she is not as tolerant of learning new things as I am.
    So, there you go.

  • Just dropped water in my macbook pro, what to do?

    I just dropped water in my macbook pro, what do I have to do in this case? Thanks!

    aline.thiel -  Check http://support.apple.com/kb/HT3053 - MacBook Pro: How to remove or install the battery  If you cannot remove the battery then I humbly apologize for providing you information which could have caused you emotional distress when you looked up how to remove the battery and could not  find out how to do it without posting back here and asking how.  I was just taking the prudent course in trying to provide you with a way to minimize risk as fast as possible by providing a complete list of options that might be open to you given the information you initially provided us,  To avoid this in the future it helps to include full information about your MBP model when asking a question since as you can see the features of different models vary. If you can remove the battery then you should do so to remove any possibility of circuits getting powered on which could result in a short circuit and components on your computer being permanently damaged.
    Note the above article does say, "For issues with MacBook Pro models that have built-in (non-removable) batteries, you should work with an Authorized Apple Service provider or an Apple Retail Store. "  This might include a wet computer.  I will hope my colleague on this forum does not object to my posting that recommendation since you have not yet told us whether or not you cannot remove the battery and if you can then I have again provided you with excessive information.

  • My memory is 4gb for my macbook pro what is ram??

    My memory is 4gb for my macbook pro what is ram??

    RAM = Random Access Memory
    the 4GB you quoted is your system memory, people say get as much as you can as it attributes to the performance of your system with major impact.
    other people disagree.. 
    quote: "640K ought to be enough for anybody." - Bill Gates, 1981
    4GB is approx 4,194,304 K

  • I have a macbook pro what virus protection should i install?

    I have a macbook pro, what virus protection should I install?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I want to run Quicken through Windows on my macbook pro, whats the best way to do this?

    I want to run Quicken 2012 through Windows on my macbook pro, whats the best way to do this?
    I have been looking at Parallels or VMware in order to use Windows but then I will also need to get a Windows license. Just looking for the most inexpensive way possible as this will probably be the only Windows app I run.
    Also looking at this CrossOver software which says you dont need Windows license. Anyone used this before? had success?

    CrossOver's website has a list of software it has certified as working or working with known issues - Quicken 2012 has a bronze rating meaning it runs but with enough issues that it isn't recommended. In other words, "Run away!"
    Get a copy of Windows 7 OEM from Amazon or New Egg and give it a try with VirtualBox (an open source virtualization program). If VirtualBox doesn't cut it you can always buy VMWare or Parallels.

  • HT4906 my iPhoto i can't open it on my macbook pro what is the problem?

    my iphoto i can't open it on my macbook pro what is the problem?

    There are 9 different versions of iPhoto and they run on 9 different versions of the Operating System. The tricks and tips for dealing with issues vary depending on the version of iPhoto and the version of the OS. So to get help you need to give as much information as you can. Include things like:
    - What version of iPhoto.
    - What version of the Operating System.
    - Details. As full a description of the problem as you can. For example, if you have a problem with exporting, then explain by describing how you are trying to export, and so on.
    - History: Is this going on long? Has anything been installed or deleted? - Are there error messages?
    - What steps have you tried already to solve the issue.
    - Anything unusual about your set up? Or how you use iPhoto?
    Anything else you can think of that might help someone understand the problem you have.

  • I want to get a macbook pro...but

    Almost a year ago i bought a late 2009 white MacBook. My mothers PC is slowly passing away so I decided i would give her my MacBook and just get a macbook pro. The problem is, i feel like any day now apple is going to come out with their updated Macbook Pros and therefor I would get more for my money. Any input/suggestions would be helpful thanks!!!

    Two months after I got my early 2009 15" MBP, the new MBPs came out in June.
    Am I sorry? Not at all. I had two months of wonderful use out of a very great machine prior to the new releases. It is still going strong and runs as well as those new ones. Not only that, but when the new ones came out, the 15" dropped two very important items that I use every day - the removable battery, and the ExpressCard slot. I can tell you that I would have been disappointed to have waited for the new ones only to find out that some functionality was gone!
    Moral here? New does not necessarily mean better!
    I would give you one piece of advice further than what's already been given in this thread... go ahead and buy now, but also buy the most computer you can afford when you do buy it - fastest, most RAM, biggest hard drive you can budget for - so that your machine will stay competitive and functional long after you purchase it. I bought the very top-end MBP available at the time, and after the new models came out, the clock speed and RAM on mine were identical to the new lineup, so mine performs just as fast as those new ones do.
    It is VERY very good advice to just buy one when you need it and not worry about waiting. Who ever knows when a company will announce a new lineup or when they won't? And I promise you, six months after you buy yours even if you DO wait, something bigger and better will come out anyway. In the meantime, you will have missed a lot of use and productivity you could have had by just getting one when you wanted to.
    Just my 2 cents,
    Raji

  • I want to get a macbook pro but Im afraid of all these problems

    I need to get a new laptop for 3D(Maya) work and some Design.. I want to get a macbook pro but I am very very worried of all these problems Ive been reading about. Whine? Too Hot? sigh....

    Well here's a simple solution if you don't feel like sending in your MBP 2, 3, and 4, maybe even 5 times to AppleCare for recurring issues: Wait until the next revision of the MBPs which will hopefully bring about the introduction of the Core 2 Duo (Merom) chips. It shouldn't be too far off in the future and if the new chip is as good as everyone's saying it is, the wait will be well worth it. The CPU whine of my MBP is HORRIBLE and to me it makes the machine utterly useless when I'm working in the lab as I need to concentrate; I'm back on my PowerBook.
    I realize that my situation is unique in that I'm working in a sound-sensitive environment. However, I paid the similar price tag on my PowerBook and this machine has been flawless. I bought the AppleCare for it and have yet to send it in for anything. My MBP is maybe 4 months old and has been to Apple's repair depot 4 times. In fact, for the first 2 and a half months of ownership, Apple had my MBP more than I did.
    Apple may have fixed the problems by now with their newer MBPs but that's anyone guess, and it's solely a gamble as to what week build MBP you'd get and what kind of problems it will have.
    My advice: I strongly recommend waiting if you can. Even if you don't work in a sound-sensitive environment, you will get great peace of mind knowing that your computer will perform, look, and sound like a well-built, $2000+ machine (hopefully).

Maybe you are looking for

  • After upgrading to yosemite macbook air(mid 2011) cannot connect to macbook air(early 2014) via airdrop

    last night i upgraded mine and my wife macbook air to yosemite. before, we can share files with airdrop easily but now the mba (early 2014) can not send file to the other one , also the old one

  • Editing (from a dj perspective)

    i am new to this apple platform and their programs... currently using imac and logic express 8. trying to edit a song from dirty to clean. two questions 1. how do i highlight a area to edit it. 2. how do i either inver/revers or or put silence (ideal

  • Power on password error

    I have an HP Compaq nc6200 laptop in which I have set up a power on password for. The problem is, when I try to enter my password, it does not work. I can enter my password up to 3 times then I get a little picture that looks like a circle with 3 lin

  • Dorpdown key with external mapping

    Hi Experts I have a situation here i'trying to resolve. Any help would be appreciated. I have 2 components A and B. Let say component A uses its view A and component B uses its view B. View A of component A uses a dropdown key. The values in dropdown

  • Questions about emailing 5 mg file using Stuffit

    My questions are: Is stuffit compatible with MS i.e. can you unzip it using MS software? If not is there a better one like WinZip? Thanks LarryB