I CANCELLED MY ORDER FOR A MAC PRO/ 30' DISPLAY (iDrones NEED NOT APPLY)

Over $5K (actually $6423.00).
I'm done with Apple and will sell off all my holdings as well.
Ciao, Jobs.

Based on your questions, you probably should just stay with a Dell, since you're pointing out all the reasons why you want a "Windows partition." If you want to use Windows programs without the advantages of Mac OSX, you're wasting money on a Mac.
You have two choices on how to use Windows on your Mac. Boot Camp, which creates the partition for you. But it's annoying, because you have to restart your Mac in Boot Camp. Again, if you need Windows that much, you'll be hating on Mac. Your other choice is Parallels, which I use for precisely one program: a GPS program from Delorme that is not Mac compatible.
But to answer your questions:
1. Yes. Easily. There's no need to partition, as long as you have the Mac programs to read them (like iPhoto which is included).
2. Quicken for Mac is fine, not sure where you got that impression. It's probably not as powerful as the Windows version. Again, you may as well buy another Dell, if that's so critical.
3. Appigo has a Mac version, so this shouldn't be a problem. Of course, there are better Mac-centric apps and programs.
4. Go with the glossy. I never have a problem with it, and I think sharp focusing on photos is better.
But really, I stand by my original point. You'll just be better with a Dell. You're overpaying for the limited Mac programs that you want to use.

Similar Messages

  • Should i get a antivirus for my mac pro

    should i get a antivirus for my mac pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Do i need a antivirus for my mac pro?

    do i need a antivirus for my mac pro?

    do i need a antivirus for my mac pro?
    At this time, you do not need it. There are ways that your Mac can get infected, but anti-virus software will not necessarily protect you, and certainly won't protect you better than other measures you could take instead. When it comes to anti-virus software, you have to balance the benefit of an added layer of security against the liklihood of problems caused by running anti-virus software, and have to also consider the effectiveness of the anti-virus software. See my Mac Malware Guide for more details. If, after reading that, you decide that you would like to use anti-virus software as an added layer of security, use one of the programs it recommends.

  • What best software to order with my Mac pro 6 core to use it for rendering

    Hello everyone,
    we're migrating our equipment from PC to Mac, I ordered a new Mac pro 6core.... and the supplier asked me for what software to include in it. Well I'm using this computer for rendering so its obvious I will ask for FInal Cut x, but is there's anything that I should ask for other than it, I just need a list of essential softwares to ask for, hope someone can help me here and one tiny detail, I have a microsoft wireless keyboard and mouse, would they function normally on my new mac, or I'm obliged to get a mac wireless mouse & keyboard ( i need wireless stuff cz of my office, its a bit small). Thanks in advanced.

    Check out Apple Compressor. It offers a wide range of encoding and reformatting capabilities. Compressor's basic capabilities are embedded into FCPX, but the stand-alone application offers far more control. You can increase rendering speeds by setting up multiple instances of the application. Not saying it's the best compression app on the market, but for $50,, it is an excellent value.
    Russ

  • 8800 GT cards ARE available for older Mac Pros...

    http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID?s=topSe llers&fnode=home/shopmac/macaccessories/displays&nplm=MB560Z/A&mco=OTkzNDY

    Frank Einstein wrote:
    do you think windows will auto-detect the card, since i used my bootcamp install cd to install the drivers for my current windows installation, would it have the drivers for this card installed or no?
    currently using the x1900 right now with just the bootcamp drivers.
    Before you swapped cards I would download the nVidia drivers now and put them somewhere on your Windows drive, make a folder for them. I'm not sure if you are using XP or Vista. Vista has a larger driver library (and newer) and I would think would detect it, but I'd still want the latest and greatest from nVidia's site.
    Worse that can happen is you'd have to start Windows in Safe Mode (basic VGA drivers) and then run the nVidia driver setup from the file you had previously downloaded.
    I just ordered the card for my Mac Pro. I had to downgrade my ATI x1900XT due to stability issues.
    Steve

  • "Best" configuration for new Mac Pro used for Aperture?

    I'm getting ready to order a new Mac Pro and would like to configure it to optimize Aperture performance.
    On CPUs - I have found no benchmarks which show whether Aperture would benefit from 2 quad core processors versus 1. Does anyone know of any benchmarks or have any experience using a single quad core? I don't want to spend $500 on a 2nd processor if Aperture can't use it.
    On Graphics cards - I was sold on the GForce 8800, due to it's supposed blazing speed for gaming and it's larger on board memory. However, after reading the following review http://www.barefeats.com/harper10.html , these guys seem to imply that applications such as Aperture actually run faster with the standard Radeon 2600 video card! If anyone has any experience or opinions on this review, I'd love to hear them!
    On memory - I know from experience that Aperture will use all of the physical memory you make available to it. I plan on ordering the standard 2GB from Apple, then adding 8GB from 3rd party for total of 10MB.
    Any help would be greatly appreciated.

    I can only say that when faced with the same decision last month, I went with a 2.8 8-core/8800GT/10gb RAM/library stored on 2nd internal drive setup and am completely satisfied with Aperture's speed. Beyond satisfied, really, borderline thrilled to be honest. No beach balls, perfectly responsive adjustment sliders, smooth and quick scrolling through images (even with Quick Preview mode turned off). Aperture 2 definitely takes advantage of all 8 cores - I have MenuMeters installed and can watch its CPU usage across all 8 cores. Exporting, for example, is fast and uses all cores for background processing.
    I have seen a couple small anomalies though...when moving photos around in a light table, I get some odd flashing artifacts on the right side of screen that could be graphics card related. Visually annoying but it doesn't affect performance. I'm also seeing some weird behavior with keywords not appearing in Tooltips and in the Viewer, but it's intermittent and is most likely a software bug and not my hardware setup.

  • Do I need antiviral software for a Mac Pro notebook

    is antiviral protection needed for a Mac Pro notebook

    WARNING: "Avast" is useless garbage that will cause you nothing but problems.
    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • How do I find out which battery is right for my mac pro 13 inch Processor  2.4 GHz Intel Core i5 late 2011 model

    how do I find out which battery is right for my mac pro 13 inch Processor  2.4 GHz Intel Core i5 late 2011 model

    You could try ringing apple and seeing if they will give you a model number for the battery and then find one on google. Or you may even be able to order one from apple themselves.
    They have support numbers for all over the world, in case you don't have the number you need, this is the support number website with all the numbers all over the world:
    http://support.apple.com/kb/HE57?viewlocale=en_US&locale=en_US

  • I am trying to install an update for my macbook pro retina display and my mac wont restart because it says my mail is still open but when i try and open my mail, it wont let me. I think it crashed. Help?

    I am trying to install an update for my macbook pro retina display and my mac wont restart because it says my mail is still open but when i try and open my mail, it wont let me. I think it crashed. Help?

    Go to: Apple > Force Quit
    and select Mail > Force Ouit.

  • How do I use Airport Extreme to act as a wireless receiver for a Mac Pro?

    Hello -
    I'm trying to use an Airport Extreme (1st Generation) as a wireless receiver for a Mac Pro but I can't figure out how.  My main modem / wireless router (non-Apple) is upstairs.  My Mac Pro is down stairs.  I'm looking to get internet connection for that Mac Pro downstairs.  Is it possible to use the Airport Extreme to connect the Mac Pro to the wireless internet provided by my wireless router?
    Thanks for the help.
    Nathan

    Is it possible to use the Airport Extreme to connect the Mac Pro to the wireless internet provided by my wireless router?
    Unfortunately, Apple designed their routers to work with other Apple routers. It would be extremely unilikely that the AirPort Exteme could be configured to work with a router from another manufacturer.
    The AirPort Extreme would need to be configured to "Extend a wireless network", but an error message is almost surely to occur when you try this.
    There are other alternatives, but they would involve more hardware. Post back if you are interested.

  • Can an iMac be used as a monitor for a Mac Pro?

    Hi all,
    I'm getting nowhere looking in the search, so I'm hoping someone can clear something up for me:
    is it possible to use an iMac as a display for a Mac Pro?
    I am beginning to think I'd better get a Mac Pro, but I already have an iMac, for which I've been researching getting external storage so I can do Final Cut Studio editing and back up of it all... as someone suggested, might be better in the long run to just get it all in the Mac Pro, and have the option and simplicity to upgrade as and when... but then there's the need for a display for the Mac Pro, which does whack the price up... but if I could use this iMac, what a beautiful monitor...
    I thought someone said that Final Cut would not allow another computer to be attached though... is that the case, anyone know?
    Thanks for any knowledge and help, much appreciated... I'm learning to not rush into anything, as you learn more the whole picture seems to change!
    Cheers, Syd

    The current 27-inch iMac can. Other iMac models can't outside of a VNC setup or ScreenRecycler; all such solutions require a standalone monitor for setup and troubleshooting.
    (51433)

  • I have a belkin 7 adapter for additional USB slots for my Mac Pro. It was working well till just recently I am getting a message that says the usb port on the Mac Pro is shutting down due to a very high power drain. Then it shuts the usb port down.

    I have a belkin 7 adapter for additional usb ports for my mac pro. It worked fine without problems till recently when the message regarding usb port drawing too much power and the computer shuts the port on the mac pro down. The strip comes with its own power supply adapter. The attachments are additional hard drives used as backups and independent data. Other than disconnecting it are there any fixes?

    You're getting the message because you're exceeding the available current, probably as a result of bus-powered drives. The power sources for hubs are rather small. Try using drives with their own power supplies.

  • How can I cancel my order for extra ICloud storage space?

    How can I cancel my order for extra ICloud storage space?
    I don't need it afterall...

    Call Apple. 1-800-My-Apple

  • Where can I obtain the AHT on disk for my Mac Pro 4.1?

    Where can I obtain a disk (iso) of the AHT for my Mac Pro 4.1 (latest OS X Yosemite) that I am busy upgrading?

    If you can fiddle with file permissions without going nuts, the original gray discs or the downloads mentioned (once the .dmg is mounted) provide a roughly 60 to 100 MByte .diagnostics [invisible] directory at:
    /Volumes/disc_name/System/Library/CoreServices/.diagnostics
    You can see this folder (on the DVD or in the download) with the Finder by looking in CoreServices, using the Find command and specifying name .diagnostics and Visibility [invisible].
    Open a second Finder window and navigate to the comparable place in the current Directory structure:
    /System/Library/CoreServices
    drag and drop the .diagnostics directory from the DVD or the download in one window to the current Core Services folder in the other window. Observe carefully to see that it actually does the copy, as Find-ing it in the current directory structure is quirky.
    You may have to authenticate as Admin, or you may already have access --
    -- otherwise you can change the permissions of the current CoreServices folder to allow you to Read & Write
    -- don't forget to change permissions back if you modified them.
    NOW try Restart and hold the D key.

  • Please help me ,i forgot the synchronising password for my mac pro lion backup disk

    please help me ,i forgot the synchronising password for my mac pro lion backup disk

    If the backup volume is encrypted, and you forgot the password, then you'll have to erase the volume and start a new backup. There's no way to recover the password.

Maybe you are looking for