I need software advice.

Well i have a imac 10.2.8 in my room. I have itunes 6 and i know i have usb 1.1 i think, but i dont care as long as it works. BUT my brother downstairs has a MAC G5. With usb 2. but the thing is. Your talking about software updates, Does itunes 6 suport all of them? Are the updates up to date with itunes 6, even tho i have a 10.2.8?

You don't state what iMac you have; iMac, iMac G4 or iMac G5. If I remember correctly, there was an iMac G4 with USB 2. To find out what version of USB you have click Apple, About this Mac, System Profiler, and go to USB.
Your iPod will work with USB 1.1. It will just take longer to transfer you music across.
iTunes 6 works with 10.2.8 and later.
Hope this helps.

Similar Messages

  • Level 5 RAID Corrupted Config, Need Software Advice.

    Hello,
    Please excuse the fact that this is not a question about an Xserve RAID.
    I have a level 5 RAID, the config table on the controller card has become corrupted. Can anyone here offer any advice on software I could use to rebuild the config and recover the data?
    It doesn't matter if it is Windows software, I would prefer software that I can run on my Mac but I am willing to try anything as long as it can handle a HFS+ Level 5 RAID.
    Again sorry for posting this question here, but I am desperate, and need advice from other Mac users.
    Thanks,
    Anil.

    If it's not XServe RAID then I don't think anyone here can offer any advice other tan very generic "talk to the manufacturer".
    Each vendor's RAID 5 implementation is going to be a little different. Without knowing how they format or layout the disks there is zero chance of recovering the data directly off the disks. That said, even if it WAS an XServe RAID, the same issues would apply - you can't read the disks directly to get the data.
    The vendor might be able to provide some clues. It might be possible to swap the drives into another identical chassis, the controller might be field-replaceable, or a professional data recovery company might be able to help ($$$$). But, as I said, these are options that are independent of the vendor.

  • I need audio editing and cd making software advice.

    I have been using Toast 8 to edit audio tracks and make cds and have reviewed Toast 9. This software has a lot of stuff I never use and excludes some valuable features like pitch shifting. Does anyone know of a stand alone audio software that includes a good pitch and tempo shifter, a normalizer that actually works and saves audio tracks until you make your cd? What I am really looking for is a program that is audio only and very good. I have reviewed Sound Studio but am reluctant to try it because reviewers say its pitch shifter is poor. I need some advice.

    I would recommend at least downloading the trial version of Sound Studio and trying it out. I work for Freeverse (the publishers of Sound Studio). I asked around, and there have not been any complaints about the pitch adjuster in the latest version 3.5.5, AFAIK. You can adjust the pitch and tempo independently.
    The trial version is fully functional, and is only limited by the number of times you can launch the program (10 times).
    www.freeverse.com/soundstudio
    If you do try it out, I'd love to hear what you think of it.

  • Need your advice on making family videos without losing quality

    I need your advice.  I don't know where to put my question because I don't know which piece of software I need (so I am posting this in a few places on the forum: sorry).  That is exactly the question, I guess.
    I have a couple of digital cameras that I use to make family videos.  They both produce .avi files.  Sometimes I use an iPhone that produces .mov files.  So after my children and grandchildren visit, I end up with a bunch of these little videos.  I want to combine them into longer videos that I can watch more conveniently on my Apple TV 2 or put on a DVD to send my kids or to my elderly mother-in-law to watch.  I know how to combine them using iMovie HD, but that process seems to radically degrade the resolution and/or image quality.  The original .avi files are 1024x768 and are very clear and sharp.  I can't watch these .avi files on my ATV2 so I've been using Quicktime Player 10.0 to open them and then save them as .mov files.  Once I import these files into iTunes, I can watch them on my ATV2 and they too look great on my tv (since they have the same resolution as the original .avi files): sharp and clear.  But after I use iMovie HD to combine them (the .avi files) into an .m4v file, they're down to 640x480, and don't look near as good.  And the DVD made from this file using iDVD looks equally bad and blocky. 
    I think what I want to know is, can I change some parameters on iMovie HD to produce files that are as high quality as the original .avi and .mov files?  Or if not, what software do I need to accomplish this?  I'm not interested in "fancy" movies.  These are just home movies, but they are important to us.  Should I upgrade my iMovie to do this?  Or get Quicktime Pro?  Or what?  I'd appreciate your advice.  I'd like to keep the process as simple as possible.

    This is my workflow. I'm sure you will get a variety of opinions, but all I can say for my AVI clips, I've had excellent results for viewing on AppleTV.
    I use iMovie HD 6 for organizing the clips into short movies, 15 minutes +/-.  Clips are imported into iMovie as DV files. Once the movies are completed, I Export from iMovie as Full Quality, which results in a my-movie.dv file.
    I then open the dv file in MPEG Streamclip. There I use the MP4 and iTunes settings for screen ratio and bit rate. 4:3 for Standard Def and 16:9 for High Def. Sounds complicated, but once you open MPEG Streamclip, the settings are simple to figure out.
    The main thing to remember about quality is not to upscale your video. If the resolution is 640x480 SD, do not export higher than 640x480.
    Here are a couple of screenshots using MPEG Streamclips "Export to MP4" setting:

  • HT4623 Have 2nd gen touch/book app will not install/need software update

    hello:
    Have 2nd gen touch...book app will not install on touch...need software update for touch to install book app...where can i download the software to run the book app per my 2nd gen touch.
    ty
    hill02

    Lastest Updates for iOS:
    iOS 2.2.1 (or iOS 3.1.3 if paid) - iTouch 1Gen
    iOS 4.2.1 - iTouch 2Gen
    iOS 5.1.1 - iTouch 3Gen
    iOS 6.1.3 - iTouch 4Gen & 5Gen
    iOS: How to update your iPhone, iPad, or iPod touch
    A second generation and third generation iTouch looks completely identical (from the outside).
    Identifying iPod models
    You can find older version apps on here:
    https://sites.google.com/site/appleclubfhs/support/advice-and-articles/finding-a pps-for-older-devices
    Hope this helps.
    Message was edited by: keeferaf

  • Weird Access Problems - Really Need Your Advice

    This is complex and confusing, and I am not an IT expert. Let me provide background and symptoms:
    1) I recently moved and transferred ISP providers from Cox to Adelphia.
    2 My setup consists of Mac G5, a Powerbook, and an Airport Station. The internet cable from Adelphia runs into the Airport Station. A cable then runs from the Airport Station to the G5, and the connection to the Powerbook is made via wireless. This setup worked very well when Cox was my ISP
    3) My Apple Mail client accesses mail servers at Cox, Adelphia, Gmail, and .Mac,
    4) When I made the hookup described in 2) I was no longer able to access Gmail from Safari. However, when I directly connected the Adelphia cable to the G5 (cutting the Airport out of the loop) I was able to access Gmail.
    5) Upon review from Adelphia they suggested that I make sure that there no static entries had been placed in the DHCP field. I checked the field using the Airport software and cleared the field (I am not sure if this was static entry or had been placed there by Adelphia).
    6) I hooked the computers and Airport up as in 2). Now the Gmail could be accessed from Safari. HOWEVER, now I could not access Adelphia's mail from Safari. Also I found that I could not access some the the web pages that came up as a result of Google searchs. This has never occurred before.
    7) Additionally, I found now when directly connected the G5 to the Adelphia cable I could still get Gmail, but I no longer could access .Mac from Safari.
    Note: I have gone through the same steps above using Foxfire and get similar results
    BASIC SUMMARY: 1) When Airport is in the connections cannot get access .Mac from Safari (but can access Gmail and Adelphia). 2) When the Airport is connected I cannot access Adelphia from Safari (but can access Gmail and .Mac).
    WHAT SHOULD I DO NEXT???: 1) Should I reset the Airport to its original factory settings and reinstall?. 2) Should I clear out the cookies?. 3) Since these are all related to various mail accounts (Gmail, .Mac, and Adelphia) is there something that could be done with the Apple Mail client???
    Need your advice!
    Mac G5   Mac OS X (10.3.9)  

    PLB11,
    pretty complex indeed.
    I would start by running Network Diagnostics with your standard configuration (i.e. the one with the Airport).
    In the Apple menu, select System Preferences, Network, then click on the "Assist me..." button on the bottom. That should give you two options: "Diagnostics" and "Assistant".
    Try Diagnostics first. If that doesn't solve your problem, run it again without the Airport. If the problem persists, run Assistant and set up a new configuration from scratch, using the original layout with the Airport.
    Please post back the results. Good luck!

  • I need some advice on what kind of virus protection program to buy.I am new to using a Mac,the promotional one is expired .I need to decide soon

    I need advice about what security program to buy the promotional one is expired. To keep the Webfoot program is expensive.Is there another less costly one recommended ?

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • If I want to put windows7 on my Mac,do I need software for a new comp. or a refurbished?

    If I want to put windows7 on my Mac,do I need software for a new comp. or a refurbished one?

    Mikestoyzz wrote:
    Looking on eBay,the software is labeled for new or refurbished.i'm putting it on through boot camp.
    With my limited knowledge, I don't think that it matters.

  • Need expert advice on buying new macbook pro 15 inch

    Hi I Am a digital textile designer and  planning to buy my first retina macbook pro. I need expert advice, which model should i buy 15 inch base model or with dedicated graphics card. i will use macbook for digital designing on Adobe photoshop and multi tasking. so now really confused is intel iris pro graphics will handle heavy files on photoshop or Nvidia GT750 m will good for heavy work. I am working on very large resolution file like 10 to 15k in resolution approx 1 GB in file size with lot of filters is being use while designing. Which model will handle above task well and last longer.

    Look at the specifications here:
    http://store.apple.com/us/buy-mac/macbook-pro
    You may be confusing the quad core CPU with the Graphics processor.
    It should have no difficulty in running Adobe Photoshop.
    Ciao.

  • In need of advice/help.

    I am having some serious issues with my MacBook.
    First, I think it is overheating. I can not run my computer for longer then an hour without it getting hot. My keyboard is getting hot along with my charger. I am not sure if this is a normal MacBook thing but it is slowing down my computer is so many ways.
    Another thing is I cannot run more then one application at a time. I am a graphic design major and I need to be able to run Adobe CS2 programs. For example, Say I am running In-Design and I need to make a fix in Photoshop, In-Design will quit. I have tried so many things to fix this but nothing works.
    I have alot of problems of running Safari also. I am very dissapointed and frustrated and I need some advice.
    Please. I have been having issues for awhile and thought it was just how these computers run, but I think I was mistaken. This is my first Apple computer.
    Thank you for reading and your input.
    MacBook   Mac OS X (10.4.8)  

    Stacey, I pointed you to an app called Temperature Monitor that will give an accurate temperature reading of your MacBook.
    Never EVER use your MacBook on a pillow or a blanket that can block airflow. I have no doubt that is adding to the problem.
    Download and install the firmware updates as well as Temperature Monitor found HERE. That way we can know what temps we are talking about. There is no way to tell if they are high if you cannot give us a reading.

  • Need Expertise Advice

    Hai,
    IDOC to JDBC (Staging table)
    IDoc is pushed in to XI.
    XI maps IDoc to staging table structure
    XI does the look up of other database tables while mapping.
              How to do the database look up???
    XI inserts data in to staging table with the status ‘new’.
    Scenario 2
    JDBC to JDBC
    XI selects the data from staging table.
    XI maps the data from staging table to the Actual table.
    XI inserts data in to the Actual Table and sends the status to SAP “Processed successfully”
    If it fails in this mapping it needs to send the status as “Error with the message to SAP”
    I want to do this as single scenario using BPM  and I want to send status to SAP once the data is successfully loaded in to the actual table or it fails in mapping at any stage.
    Need expertise advice to do this and how to do the database look up?
    Thanks in Advance

    Hi,
      Almost every thing has been said, you can also refer to this for Lookups,
    http://help.sap.com/saphelp_nw04/helpdata/en/cf/406642ea59c753e10000000a1550b0/content.htm
    For the second part, you may consider an alert.
    /people/michal.krawczyk2/blog/2005/09/09/xi-alerts--step-by-step
    /people/michal.krawczyk2/blog/2005/09/09/xi-alerts--troubleshooting-guide
    /people/aravindh.prasanna/blog/2005/12/23/configuring-scenario-specific-e-mail-alerts-in-xi-ccms-part--1
    This weblogs might help you.
    Regards,
    Anirban.

  • HT1338 Need software for my Mac to use my Cannon MX 340 Scanner / Printer

    Need software for my Mac to use my Cannon MX 340 Scanner / Printer

    The latest software I found for that model was for Mac OS 10.7.
    I expect you are running Mac OS 10.8 or Mavericks in which case contact Canon and see if they have updated their drivers for your MX 340 Scanner / Printer.

  • Business Delegate pattern - need some advice

    Hi. First let me apologize for the long post. I could see no other way. I�m building a system that quite large and I need some advice. The system is a type of transaction system, let�s suppose a shopping cart. I�m using struts taglibs and tiles for presentation, struts proper for controller, and POJOs for business logic. Also I�m using OJB for my data tier.
    Now I�ve been reading Pro Jakarta Struts (Apress), which BTW is a recommended read to anyone with novice experience in struts and related technologies. I�ve assimilated most of the techniques and patterns described in the book, and most of them make sense to me. However, I�ve hit a snag while reading the Business Delegate and Service Locator patterns.
    The way I had though of building my application before reading the book, was to have a wrapper class, such as the following:
    public class ShoppingCart {
      private IAuthenticationService authenticationService;
      private ITransactionService transactionService;
      public ShoppingCart() {
         authenticationService = new DBAuthenticationService();
         authenticationService = new DBTransactionService();
      public login(String username, String password) {
         String sessionToken = authenticationService.logon(username, password);
         return sessionToken;
      private boolean isValidUser(sessionToken) {
         bolean validUser =  authenticationService.isValidUser(sessionToken);
         return validUser;
      public performTransaction(sessionToken, TransactionVO) {
         if (!isValidUser(sessionToken) {
              throw new AuthenticationException();
         transcationService.performTransaction(TransactionVO);
      public editPreferences(sessionToken, PreferencesVO) {
         if (!isValidUser(sessionToken) {
              throw new AuthenticationException();
         authenticationService.performTransaction(PreferencesVO);
    }My idea was that my wrapper class would isolate all the business logic and could perform login service in case my application was ever to be used with other presentation layer than struts (standalone client, web services). However I believe that this overlaps the Business Delegate pattern and maybe even totally implements it. The way I understand the code I�m reading in the book, they suggest having a BD for each major service such as AuthenticationServiceBD, TransactionServiceBD, etc� However this would break my single point of entry for authenticating users. I really need some advice on my design and how it fits with the BD and SL patterns (or others). I would also like to know what you think/recommend of my authentication strategy.
    thanks in advance
    Raphael

    Thanks for your reply. This however, I understood. My concern is regarding my application in regards to business delegate pattern. You see I have this class (simplified for clarity):
    public class ShoppingCart {
       private ILoginService ls = new DBLoginService();
       private ITransactionService ts = new DBTransService();
       // and so on for all services I offer.
       //  then I mirror all the calls of my private interfaces
       //  and pass them through internally
       public String sessionToken login(String username, String password) {
            ls.login(username, password);
       public boolean addToCart(sessionToken, itemNo) {
            // check session
            ts.addToCart(sessionToken, itemNo);
       //  and so on
    }Multiple questions for this one:
    1) Am I not already implementing the Business Delegate pattern with my ShoppingCart class since all interfaces are private and all calls are mirrored from the wrapper class (ShoppingCart) to the private interfaces? All services are implemented as POJOs and I am not using JNDI at the present so I don't use the ServiceLocator pattern.
    2) I store a reference to the wrapper class (ShoppingCart) in the ServletContext so I can grab it from my Action classes. What do you think of this approach?
    3) How many BDs should an application contain. In my case I use just one. What is the advantage of using more?
    4) I create my own session tokens in case I ever want to use to business code in a non-web applications where sessions are not available readily. This brings about the problem that I can't pass the interfaces directly to the Action classes because the login session needs to be checked before any calls to services. So all methods include a sessionToken parameter which I use to check the session. This way, if I want to expose some of the services through web services, I can still use a login. What do you think of this approach.
    5) Any other remarks are very welcome...
    I really need help with this from an experienced programmer. Most things I can handle on my own but with this type of design issue, books just don't cut it. I need experience. I would really apreciate some feedback.
    Raphael
    ps: I would give all my Duke dollars for this (I only have 30), but I'm not sure how. If you want them I can create a dummy question and give them to you.

  • Need Network Advice: Multiple IP numbers.

    Hello I need some advice on setting up my office's network. I have a small amount of network knowledge, mostly just setting up my home networks and our offices simple existing network. Right now we have Verizon internet. The network looks like this -
    1 static IP -> Verizon Modem/Router -> 24port gig switch -> wired to 8 offices -> connected to 8 computers.
    We are canceling Verizon and getting Comcast with 5 IP addresses. Our goal is to continue using a network like we have, but add a server on the side for clients and remote employees to drop files. We have 2 mac mini's ready for the task of being servers with OSX Tiger on them. I would like to set one or both of them up as FTP servers, so we can hand out login/pass info and people can ftp into them to drop stuff or pick stuff up.
    Anyone have any advice for how to setup a network with multiple IP addresses? Do I need more than 1 router? Which router is best for Mac, because we will need a new one to replace verizons. Any advice on where I can find information on setting up the FTP server on our mac mini with Tiger? I've looked around, but I don't think the sites I found were using Tiger, menus weren't exact and I couldn't get it to work.
    Thanks for the help!
    Our office is ALL mac, 5x_8-core 2x_imac 2x_macpro 2x_mini

    You don't need a "Gigabit router". It's way, way overkill (and $$$$$$) for your network.
    The Comcast link is going to max out at about 15-20mpbs, so any router with 100mpbs links is going to be more than sufficient.
    As it happens, I wouldn't get a router anyway. Comcast are going to provide you with a router (they need to in order to terminate the RG-58 cable connection they drop and provide an ethernet port (that ethernet port, BTW, will be 100base-T).
    What you really need is a firewall. One that can handle multiple public IP addresses and allow specific incoming traffic (e.g. the FTP servers).
    I would recommend something from NetScreen. You may be able to pick up one of their NetScreen 5GTs pretty cheap now they're end of life (I have several of these around my network, including one in the exact same configuration you're talking about here). Failing that the SSG-5 would be sufficient.
    They also have the advantage of being able to run as a VPN endpoint should you need that functionality.
    At the end of the day your network topology would look something like:
    Comcast router -> (NetScreen) Firewall -> Switch -> Clients
    All the clients will connect to the switch and can talk amongst themselves at gigabit speeds. Any internet traffic would pass from the switch to the firewall and out to the big bad world.

  • I need software that enables me to switch between different modes/profiles on my Mac

    I need software the allows me to switch between modes with a click on my computer.
    For example:
    Mode 1:      Disables the screen saver
                      Changes power settings
                      Changes the wallpaper
    Mode 2:      Sets everything to standard

    http://startly.com/products/quickeys/mac/4/

Maybe you are looking for

  • I have Acrobat 7.0 Professional loaded on Windows 7; No Printer & error msgs

    I have Adobe Acrobate 7.0 Professional, loaded onto a new Dell Inspiron N5010 clone where I have Windows 7. I installed the Acrobat successfully, but the virtual printer does not show up as an available printer in my Devices & Printers.  Also when I

  • BOA PDF

    Has anyone had any luck with Bank of America charge off from a credit card? Starting the journey of rebuilding and had a credit card default in 2011, I have been blessed to have resources to pay in full. Would just like to get this huge black eye on

  • How to get the Ship-To text for an Order from R/3 to CRM?

    Hi experts, how to get the Ship-to-Party text for an Order from R/3 to CRM? Here I used a Function Module CRM_ORDER_READ and its working in the Development server. After when this passed to the Stage Server for the Order i am maintaining the same Shi

  • Format axes in chart components

    I want my y-axis to start from some arbitrary -ve number i.e shift the origin to an arbitrary number so that the charts start from there. Is it possible to do that?

  • Error on classes5.jar

    Please give me a hand... I have encounter an error as below during install o817 in RH6.2... ERROR:/u01/app/oracle/product/8.1.7/jar classes5.jar It's work if I ignore it... null