Is 1000 MB of internet enough for my iPhone 4s

I've bought an iPhone 4s brand new, but I'd like to know if 1000 MB it's enough to navigate and uses most of the app aviables. For iPhone
Thanks a lot

With about 500,000 apps available there's no way to answer that question. I have 170 apps, and the most I've ever used in a month is 300 MB. But there are plenty of people in these forums who have used over 2GB (2,000 MB), so it depends what you are using it for.

Similar Messages

  • Library sharing not enough for two iPhones

    My wife and I have our own computers (hers a Macbook Pro, mine a Mini), and we're sharing iTunes libraries, which works fine. However, we also each have our own iPhones (both version 5), registered to our own computers, and we cannot get any of the music from my library into her iPhone. Is this possible? Do we need to have every song she wants on her phone, to be in her laptop's library? I'm stuck!
    iPhone 5, iOS 8.1.2
    Macbook Pro and Mac Mini, both running 10.10.1

    You don't say what you are trying or how you are sharing.  There's all kinds of ways to share music in a family, from Home Sharing to Family Sharing.
    iTunes: How to share music and video - http://support.apple.com/kb/HT2688 - about Music Sharing and Home Sharing
    Home Sharing Support page - http://www.apple.com/support/homesharing/
    iTunes: Setting up Home Sharing on your computer - http://support.apple.com/kb/HT4620
    Understanding Home Sharing - http://support.apple.com/kb/HT3819
    Family Sharing - http://support.apple.com/kb/HT201060 - "Family Sharing makes it easy for up to six people in your family to share each other’s iTunes, iBooks, and App Store purchases without sharing accounts. Pay for family purchases with the same credit card and approve kids’ spending right from a parent’s device. And share photos, a family calendar, and more to help keep everyone connected."
    Since you don't provide details about your sharing it is hard to provide suggestions.  If you are simply syncing media you may find you have to put all the files she needs physically on her computer.

  • [svn:fx-trunk] 12007: When the Internet Explorer browser window is obscured Stage. width and Stage.height never return the proper sizes until/ unless the IE window is unobscured long enough for the player to feel it needs to render initially .

    Revision: 12007
    Revision: 12007
    Author:   [email protected]
    Date:     2009-11-19 12:45:27 -0800 (Thu, 19 Nov 2009)
    Log Message:
    When the Internet Explorer browser window is obscured Stage.width and Stage.height never return the proper sizes until/unless the IE window is unobscured long enough for the player to feel it needs to render initially.  This was preventing our preloader from completing, since we were waiting for a non-0 Stage size.  Took a slightly different approach to solving the bug for which the original logic was added to work around.
    QE notes: None
    Doc notes: None
    Bugs: SDK-24191
    Reviewer: Alex, Evtim
    Tests run: Checkin
    Is noteworthy for integration: No
    Ticket Links:
        http://bugs.adobe.com/jira/browse/non-0
        http://bugs.adobe.com/jira/browse/SDK-24191
    Modified Paths:
        flex/sdk/trunk/frameworks/projects/framework/src/mx/managers/SystemManager.as
        flex/sdk/trunk/frameworks/projects/framework/src/mx/preloaders/Preloader.as

    Revision: 12007
    Revision: 12007
    Author:   [email protected]
    Date:     2009-11-19 12:45:27 -0800 (Thu, 19 Nov 2009)
    Log Message:
    When the Internet Explorer browser window is obscured Stage.width and Stage.height never return the proper sizes until/unless the IE window is unobscured long enough for the player to feel it needs to render initially.  This was preventing our preloader from completing, since we were waiting for a non-0 Stage size.  Took a slightly different approach to solving the bug for which the original logic was added to work around.
    QE notes: None
    Doc notes: None
    Bugs: SDK-24191
    Reviewer: Alex, Evtim
    Tests run: Checkin
    Is noteworthy for integration: No
    Ticket Links:
        http://bugs.adobe.com/jira/browse/non-0
        http://bugs.adobe.com/jira/browse/SDK-24191
    Modified Paths:
        flex/sdk/trunk/frameworks/projects/framework/src/mx/managers/SystemManager.as
        flex/sdk/trunk/frameworks/projects/framework/src/mx/preloaders/Preloader.as

  • My system needs internet explorer for a application I need to down load, however I need to down load the latest yahoo tool bar for internet explorer to work properly and firefox will not allow the down load of yahoo toolbar. How do I fix this?

    I have not used Internet explorer since downloading firefox and I need IE for a trading platform that I need to use. In order to get IE working I apparently need to down load the latest version of Yahoo toolbar, however when I try to down load the tool bar Firefox will not allow the down load of that file.

    Thank you so much, for once in my computer life I knew what the problem was, what caused it, why it was caused, what it did, what it made it do and most importantly how to fix it and to do it correctly and expeditiously. I can not Thank You all enough for all of the help! I also have Pogo mailed this to all on my friends list, where they have all learned as I have and have fixed theirs also. and the message is being spread. Thank You again, I just can not say it enough.

  • Is the new macbook's performance good enough for me?

    Hi,
    I didn't see any topic for the new MacBook, so I just put this question here, hope you people don't really mind, sorry for that.
    My plan for next couple years on was to build a PC by myself, and buy a new laptop that have a nice design but can deliver enough performance for my need.  Here is what I was thinking about.
    Sometimes I need to do something hard and intensive, also need playing video games for fun, which these are not quiet often.  Which is exactly why I want to build a desktop PC for.  Other times I need to use GIMP and I want to learn programming, knowing to use commands, or creating something new just for fun, also playing games that is not very intensive on performance (Minecraft, Left 4 Dead 2, GMOD(which could be intensive sometimes)).  But most of the times, I am just taking to my friends on internet, watching videos, or making a document maybe checking e-mails.
    Consider about that, my laptop will be the primary platform, and only uses Desktop PC for heavy works.  It might also save some money for electricity :-)
    My current Dell Inspiron 3000 was good, but sometimes I thought the N3530 was under-power, that does not benefits me on performance.  I have a mid-2012 MacBook Air from school which is faster, and is more than enough to do schoolwork and web broswing. The new MacBook I checked was pretty impressive and I like that design, but a lot of people have argued that performance, afraid that performance could only do light tasks.
    These days I see the report that New MacBook was on par with mid-2011 MacBook Air on performance, so I guess it could benefits me.  If the performance is good enough, I will go with this one, regardless about price-performance thing.

    Think of the new Macbook as a powerful iPad that can run OS X.....is that powerful enough for you? Sexy as they are, and I want one too, they're just an entry level computer.

  • Is there an external data storage device for an IPAD? 64MB is not enough for me. . . o_O

    Is there an external data storage device for an IPAD? 64MB is not enough for me. . . o_O " HELP ! "

    There may be others.
    Here is an interesting product:
    http://www.airstash.com/
                                            Size & Weight                               
                                            Connectivity                               
                                            WiFi:                                                                
                                                    802.11b/g (54 Mbps max)                                       
                                              Range: 50m (160 ft) line of sight                                       
                                              Maximum simultaneous connections: 8                                       
                                              Configurable security: open and WEP; WPA available in upcoming firmware release                                       
                                                                            USB:                                                               
                                                    USB 2.0 High Speed (480 Mbps)                                       
                                                    USB Mass Storage Class                                       
                                                                            Power & Battery                                                               
                                                    Built-in rechargeable lithium polymer battery (non-replaceable)                                       
                                                    Charging via USB connector to computer or powered hub                                       
                                            Capacity                               
                                            SD / SDHC Card up to 32 GB (user supplied)                                                                                                         Compatibility                                                                                                        Wireless operation:                                                               
                                                    Web browser WiFi b/g capable device                                       
                                                    Optimized experience for iPhone, iPod touch, and iPad via HTML5                                       
                                                    No internet connection required                                       

  • Sporadic Rotating Loss of Internet Connection for Just Some Devices

    Hi,
    We've been having a problem where one or two of our devices (phones, laptops, iPads, Apple TV) lose internet connection for 10-30 sec at a time, while the others are fine.
    As best as I can tell it's a full loss of connection, not just something running very slowly due to us pushing the bandwidth limits. I've experienced the latter elsewhere and this manifests very differently. It will instantly and fully disconnect a person from an online game or drop a skype call without the accompanying prolonged lag or distortion of bottlenecked bandwidth.
    It happens at all times of day, and does not seem related to our peak times of bandwidth usage, nor the general public's peak times of usage.
    We should have enough bandwidh for our usage, and usually we do. Our system is 25/25 Mbps and during our peak use at most we would probably have 1 laptop gaming, 1 HD video stream, and 2 non-HD streams. However, like I said before, the problem seems unrelated to overall bandwidth usage. The same problem occurs even at midnight when our local usage is minimal.
    Overall we have 6 laptops, 5 phones, an iPad, 2 microcell signal boosters, and Apple TV, in total connected to the FiOS. We have a property with tenants where the signal is distributed via 3 WiFi routers and one direct ethernet cable to my laptop, and one to the Apple TV.
    It happens on devices that are both connected through the WiFi (wife's laptop, phones, iPad) and ethernet (my laptop, Apple TV). It can happen with devices that are a few unobstructed feet from the WiFi router. However, it anecdotely seems to happen more on our phones than laptops. 
    My hunch is it is something outside our local network. This is because our equipment  and usage has basically remained unchanged over the last couple months. (We got one new microcell tower for a different carrier, one new wifi router, but overall same # of people and patterns of usage.) And yet the problem seems to be getting worse. Back in probably early November I don't remember this problem occuring at all. 
    My second best guess is there are more devices connected to the network than it can handle simultaneously, and it rotates which gets kicked off. Maybe this was occuring before but we didnt realize it.
    My third guess is it has to due with signal interference with the various WiFi routers and microcell boosters. However, this seems less likely since it also affects devices connected via ethernet cables. 
    Any thoughts or advice is much appreciated! Thanks!
    -Ned

    Ok, so in the mean time we decided to upgrade our service so I've only tried this solution now. 
    My problem though now is I can log into 192.168.1.1, then give my verizon admin password, and then set my channel preference. That seems fine for changing the main network input and wifi router (call it A). 
    However, we have another wifi router (call it B) which is fed from A via a cable. I cannot figure out how to change B's wifi channel. Therefore I worry if we have only switched A, since A feeds B (as well as the 2 microcells) they will all still be on the same channel and therefore still interfering with each other. 
    I have tried www.routerlogin.net (and .com) as written on my netgear router and I get "http://searchassist.verizon.com/" telling me "Sorry, We could not find www.routerlogin.net". I have also tried logging into wifi router B via all the 192.168.1.X addresses I see listed on the Verzion account when I log in via 192.168.1.1 (in total I tried all the 192.168.1.[1-24] options).
    Thanks for the help!

  • Is it suggested to use an additional layer of internet security such as ESET Cyber Security Pro - Internet Security for Mac

    I just want to make sure I am as safe as possible with all the internet hacking that has been in the Media. I have a Mac Mini that was purchased in Aug. 2013.  Is it suggested to use an additional layer of internet security such as ESET® Cyber Security Pro - Internet Security for Mac ???

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Internet Requirements for Touch?

    I would get a new iPod Touch if I was sure I would have internet access in my home, so I was wondering if it required broadband or a minimum download/upload speed.
    Currently I have satellite internet, at 512kbps down and 128kbps up and yes I have a wireless router, is this enough? And do you think it would be very slow, or not? Thanks in advance

    There is no minimum requirement for internet speed with the touch but the slower connection you have the slower it will be.
    Yes, it's enough. It may be a bit slow if you are downloading large files (such as movies)) but it should be good enough for browsing and everything else.

  • Is this PowerBook Good enough for making music?

    Is this powerbook : PowerBook G4 17Inch
    17-inch TFT widescreen display with 1680x1050 resolution
    1.67GHz PowerPC G4 processor
    2GB memory (DDR2)
    120GB 5400rpm hard drive
    Slot-load 8x SuperDrive (DVD+R DL/DVDRW/CD-RW)
    ATI Mobility Radeon 9700 graphics card with 128MB DDR memory
    The Latest or the last model of Powerbooks
    Is it good enough for making music or editing few video clips?
    Will Snow Leopard run on it?
    Can i upgrade more ram in it ?

    Yes, that Powerbook can be used to make music or edit video clips. When it was new, it was required at the North Carolina School of the Arts for their Film program, using Final Cut software. Having a more powerful Intel CPU would speed up the rendering and processing times, however, the 1.67Ghz Powerbook can certainly handle video editing.
    I know people that have used Garageband on it to make music.
    The last operating system you can run on it is OS X 10.5 Leopard, with the last release being 10.5.8.
    It's RAM is maxed out at 2GB. 
    As long as you don't need newer software that requires an Intel processor and aren't going to rely on that as your system to access streaming video's on the internet, it should work for you.

  • Bluetooth internet setup for mac using my blackberry pearl

    I have a blackberry pearl with AT&T. I have it set up with my bluetooth for file sharing. I am trying to set up an internet connection with my phone through blue tooth. When I get to the final step I put down all the right information for the telephone and account name and password. I cant find the blackberry modem in my modem list though so I dont know which modem to use.
    Please let me know if anyone has had this problem or has a pearl set up right.

    LostRealist wrote:
    I have certain internet pages that refuse to display correctly in Safari or Firefox. Is it possible to download Internet Explorer to my MacBook?
    Two things about IE for Mac:
    1. It does not use the same rendering engine as IE for Windows. IE for Mac's rendering engine is currently obsolete...on both platforms.
    2. If your pages need to display with a feature like ActiveX which is Windows only, IE for Mac doesn't have that.
    So even if you do get IE for Mac, it might not solve your problem. If the problem is related to the rendering engine or something like ActiveX, changing the UserAgent won't solve the problem either. Won't hurt to try, though.
    The most reliable way to solve your problem is to run Windows on your Mac Book through Boot Camp, VMWare Fusion, or Parallels Desktop, and run Internet Explorer for Windows on that. I don't know if it's worth doing for one presentation, but if you do this all the time it might be worth it and if you have enough RAM. At least all you need for Boot Camp is a copy of Windows.

  • ***CALLING ALL MACBOOK AIR USERS*** Will the base model of the 2013 Macbook Air 11" be enough for my needs?

    Ok,
    This is my first post to this forum.
    I have a Late 2011 i5 Macbook Pro. I used this last year during college but the weight was just unbearable. I have decided this year to upgrade to a Macbook Air. Here is my question.
    I am starting uni and will be studying Nursing and so I will not be using any heavy software or progaming etc.
    The only thing I will use is Office for Mac and browsing. I normally keep around 15 browser tabs open whilst I research.
    I also like to download so I would also like Vuse on my Macbook too. I own an external hardrive and so memory isnt a big deal (unless it makes a difference to the performance of the mac itself, Sorry im not great with this stuff)
    Do you guys think the base model of the 11" Macbook Air (1.3ghz, 4GB ram, 128GB SSD) will be enough for my needs or do you think I would need to custom build it (1.7ghz, 8GB ram, 128GB SSD)?
    My boyfriend thinks for what im using it for the base model will be fine but I dont want to get it to find that its not enough as my main concern is lag but I also do not want to pay extra for something which isnt going to be fully used (ie my current Macbook Pro).
    For those of you who do have the 11' Macbook air, how are you finding it? Also, this will be my main computing device, I am selling my Pro but am thinking of buying the wireless keyboard and trackpad so I can connect to an extenal monitor whilst im at home.
    Thank you guys in adavnce for any answers.

    I too have a 2011 mackbook pro and I also have a mid 2012 mackbook air 128 gb ssd and 4 gb ram , I am probably goint to sell the pro because I just don't use it anymore . If you intend to do heavy multi tasking 8gb ram as suggested by a previous poster might be worth the extra money.

  • How do I use Airport Extreme to limit internet time for my kids?  His computer is hardwired to the modem.

    How do I use Airport Extreme to limit internet time for my kids?  His computer is hardwired to the modem.

    You can set up daily time limits for each computer that connects using wireless, but it is not possible to do this when a computer is connecting directly using a wired Ethernet connection.
    Open Macintosh HD > Applications > Utilities > AirPort Utility on your Mac and click Manual Setup
    Click the Access Control tab below the icons
    Select Timed Access
    For more details on this, click the Help menu at the top of the screen and enter the following phrase into the search box:
    Controlling access to your wireless network
    A more sophisticated approach would be to use a service provided by OpenDNS. From your computer, this would allow you to monitor web sites visited, and block any unsuitable sites. More info is here:
    http://www.opendns.com/landings/familyshield

  • No internet access for vlan devices

    Hey folks, 
    I'm new to cisco and have only recently started study for my ccna. In preperation for this i've gotten my hands on a cisco emi 3550-48 port switch so i can play and test some scenario's. 
    Now, I've setup a couple of vlans (200,201 and 202) and i've assigned them to fa0/3, 0/5 a0/7 respectively. i suppose it's irrelevant which ports are assign, they are just the ports i've assigned while typing this. 
    I know the cisco forums are full of people saying the intervlan routing isnt working and it just turns out to be the static route on the router in the end but i have set all that up and i can not get internet access on my vlan networks. The wierd thing is the switch itself can ping the internet no problem. 
    Here is my setup : 
    I've assigned ip addresses as follows :
    vlan 200 - 10.10.200.254/24
    vlan 201 - 10.10.201.254/24
    vlan 202 - 10.10.202.254/24
    I then enabled intervlan routing by issueing "IP ROUTING"
    At this point I configured the VDSL modem/router (zyxel F1000) on IP Address 192.168.1.2/30 and I configured interface fa0/1 with the following commands : 
    interface fa0/1
    no switchport
    ip address 192.168.1.1 255.255.255.252 
    no shutdown
    I then set the default route using : 
    ip route 0.0.0.0 0.0.0.0 192.168.1.2
    Finally I configured three static route's on my Zyxel F1000 modem/router to send traffic back to my three vlans using the gateway 192.168.1.1
    As i said above, If I plug into fa 0/3 (vlan 200) and lets say I give myself an ip address of 10.10.200.20, 255.255.255.0 and gateway 10.10.200.254. I can ping the othe vlns and devices on the other vlans no problem but bot for love nor money can i get onto the internet. For clarifications sake my dns is set to 8.8.8.8
    Stranger still is the fact that the switch can ping hostnames and ips on the internet no problem. Has anyone got any ideas what could possibly be wrong?? I'm completely stumped. 
    Regards, 
    Thomas Quigley

    Hey guys,
    Thanks for the speedy replies. I have been trying this for about 2 weeks now and last night after posting this message to the cisco forums I got my hands on an old Sonicwall router. I decided to test the connection using this as I suspected that Zyxel router is buggy. 
    I setup a PPPoE connection on the sonicwall and set that up as my default route matching exactly the ip settings listed above and it worked immediately. 
    I knew the setup I had ran above was right it was just tormenting me that it wouldn't work. Turns out its the piece of crap Zyxek VDSL modem. 
    Thanks for taking the time to read my post and offer advice. 
    Cheers, 
    TQ

  • Is there a way to transfer the iTunes application to my PC using my iPhone? My PC has no means of connecting to the Internet and I do not wish to pay for Internet tethering for a one time use.

    Is there a way to transfer the iTunes application to my PC using my iPhone? My PC has no means of connecting to the Internet and I do not wish to pay for Internet tethering for a one time use. I don't have the app on my computer and I simply wish to have it on there to actually be able to transfer my files.

    You can transfer the app to your PC to save it, the article below will show you how:
    iTunes Store: Transferring purchases from your iOS device

Maybe you are looking for

  • Error while creating standby database

    Hi, ORACLE VERSION:10.2.0.1.0 OPERATING SYSTEM:WINDOWS While i am trying to setup a standby database i am getting the following error in my parameter file. SQL> startup ORA-02778: Name given for the log directory is invalid Here is my pfile orakill._

  • Is Time Machine Apple's worst piece of software EVER?

    I am sick of Time Machine not working properly. I've tried it with an Airport Extreme and an external disk, with Time Capsule, using Leopard, Snow Lepard and now Lion. I do an erase of whichever disk I'm using and then a full backup - and it works fi

  • Business Package For Supplier in Netweaver Portal

    Hi All, I need your help to let me know what are the post installation activities to be performed after the installation of business package for supplier 4.0 ( SAP Netweaver Portal 7.3). Can anybody provide me configuration document of Business packa

  • Setting font size for code view

    On my 19" desktop monitor the text size in code view is easy enough to read, but on my hi resolution 17" laptop it is really, really tiny. I can't find any prefs setting or another way to make the font for code view larger. Is there such a setting so

  • ISync, Palm Treo 650, and my sanity

    Just bought a Palm Treo 650 this evening and I'm having the hardest time. Been trying to iSync via USB with mixed luck. I installed the software that came with the phone, made sure my HotSync settings were correct, and hit the Hotsync button on the U