Looking for a bit of advice... (UK)

I'm going to be moving into a new place shortly, the house currently has a BT Voyager Router/Modem, with the USB port connecting the household PC. The ethernet port isn't used, so I could use that to connect my iBook, but my bedroom is at the other end of the house, with would restrict my use somewhat.
I'm now looking into working wirelessly.
Admittedly, I'm a little naive and new to the wireless set up, so I was wondering if any of you better qualified users could advise me on the most beneficial option to persue.
Does the Airport Extreme have the ability to plug into an existing modem? Like the one in my new house.

Yes.
You can plug an Airport Base Station into the ethernet port of your BT Voyager Modem/Router.
Also check out the following website.
Reviews of equipment
http://www.adslguide.org.uk/reviews/
iFelix

Similar Messages

  • Hi looking for a bit of free  anti - virus and firewall for osx 10.8.2

    hi looking for a bit of free  anti - virus and firewall for osx 10.8.2 any pointers also any one used Mac cleaner ?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. This feature is transparent to the user, but internally Apple calls it "XProtect." The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore reduces to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    5. Java on the network (not to be confused with JavaScript, to which it's not related) is a weak point in the security of any operating system. If a Java web plugin is not installed, don't install one unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so can corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. If you don't need to do that, avoid it. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    8. The greatest danger posed by anti-virus software, in my opinion, is its effect on human behavior. When people install such software, which does little or nothing to protect them from emerging threats, they get a false sense of security from it, and then they may do things that make them more vulnerable. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use.

  • IPhoto user looking for a bit more editing ability

    I love iPhoto but I wish I could extract parts of pictures to go on other pics. Then I use a cloning tool to fix. I can't stand Adobe Elements is their any other program out their that people are using for this kind of editing. Aperture?

    matbran
    I don't think that Aperture is what you're looking for. Try Graphic Convertor
    http://www.lemkesoft.com/en/index.htm
    or try searching on http://www.macupdate.com using 'image editor'.
    Regards
    TD

  • Looking for a web font - advice please

    Hi, I know this isn't a DW question, but I'm hoping somebody might be able to guide me.
    I'm looking for a font (preferably on google fonts) that resembles Edwardian Script. If anybody knows off the top of their head a font that is similar, could you advise me please?
    Thanks.
    Mat

    Nancy O. wrote:
    Most hobbyists and bloggers sites could probably fly under the radar with unlicensed fonts.  But commercial web sites could be in for a whole heap of litigation woes.  It's  not worth the risk for something so trivial.    
    Please cite a case where a commercial website was sued for violating the fonts license?  In UK Harrods tried to sue a coffee shop for using Harrods fonts and they lost with heavy legal costs.  Fonts can never be patented and people are free to use whenever they can.
    Some bully boys will try anything but people have to stand for their rights.  I am currently in dispute with easy Jet because I have registered one website with name like easy XXXXX.  Now they tried to bully me for using the word easy and I challenged them to sue me.  Their solicitors wrote to me and intimidating me and I won the first round.  They are appealing and so the case continues.  The court has decided that I should not promote the website until the appeal is heard but in the meantime, I have notified easy jet the revenue I am losing because of this restrictions. The court is aware of this and if I win the case, I shall be entitled to millions of pounds in compensation due to lost revenues.

  • Professional from Sales Background , looking for relevant SAP course advice.

    Hi,
    I am 6 years experienced Business Development professional . I am willing to pursue an SAP certification that could suit my experience and help me travel abroad in future. Since I am from a non technical background , i was seeking help to get an idea of relevant courses that would suit my experience.
    Mainly looking for Functional Consultant profile.
    Looking forward to have help from experienced people.
    Thanks & Regards,
    Chaitali

    Hi,
    I am 6 years experienced Business Development professional . I am willing to pursue an SAP certification that could suit my experience and help me travel abroad in future. Since I am from a non technical background , i was seeking help to get an idea of relevant courses that would suit my experience.
    Mainly looking for Functional Consultant profile.
    Looking forward to have help from experienced people.
    Thanks & Regards,
    Chaitali

  • Looking for 64 bit version of firefox, pre-release or Beta ok

    I have Win7 Pro 64bit. Was having issues with continuous crashing of flash. I installed Adobe Flash Square version10 64bit with Firefox version4, reduced # of flash crashes.
    When firefox pushed out version 5, I installed it & the browser kept dragging/crashing all over again. looked up Adobe Flash Square to see if any info avail, Adobe had Adobe Flash Square version11 64bit, so I uninstalled version 10 prior to installing version11 per Adobe instructions. Although it has helped, it is not where it was prior to installing Firefox 5.
    I have tested Firefox 5 with the current Adobe Flash 32bit release as well, and what can I say, it's not work the effort on my 64bit system. for some reason this combo maxes out my cpu (2.8 dual core) & memory (4 gb + virtual), causing me to hard boot my system.
    I understand Firefox devs are working on a 64bit version for Windows. I would like to volunteer to test it. I have many years of SW design & QA experience so any bugs I find I will fully document.
    The 64bit version of IE works well with the 64bit Flash, lots better than 32bit version, but I prefer to use Firefox or Chrome (I often utilize both simultaneously, each on own screen).
    Please let me know if a 64bit version of Firefox is available (pre-release/beta ok) & if it is not is there an expected availability date?
    Thank you in advance,
    Verta Tannehill

    Nightly is a pre-release testing version of Firefox: bleeding edge and not necessarily stable. It is Firefox -- a rose by any other name, and all -- but it is buggy, as all testing software is (I'm using it right now). New Firefox versions are born from Nightly, so when a 64-bit version of Firefox is released, it will have come from Nightly development. Use it for general browsing and send feedback (Tools -> Options -> Advanced -> General) and you will be helping to beta test a new baby Firefox.

  • Looking for 64 bit Windows version of release 9.x of WebLogic

    I'm trying to find a 64 bit version for Windows of any 9.x release of WebLogic. The only 9.x release I can find is 9.2.3 in 32 bit. Ideally, I'd like version 9.1, but any later than 9.1 will do, as long as it's 64 bit and Windows.
    Can anyone help me?
    Thanks

    edelivery.oracle.com
    Choose "Oracle BEA"
    Then either x64 or Itanium
    Then click on the link for the one you want, say: BEA WebLogic Media Pack for Microsoft Windows x64 (64-bit)
    You should see a 9.2 MP3 download there.

  • Hi, I am looking for a bit of advise

    I had a major meltdown on my MacBook Pro earlier in the year and had to have a new hard drive fitted. I had all my files and software backed up which I'd used to restore my system. Even though I've done this, I am still having problems with the Mac being flaky, so I want to go back to basics and do a complete fresh install of all my software including my Adobe CS6 Master Collection Suite - as I am reinstalling this on the same computer do I still need to deactivate the software first before I wipe my drive clean?

    Thanks for the confirmation - I thought I might have to deactivate the software, but was unsure. I've downloaded the cleaner tool and will back everything up to Time Machine before I start. Just a quick question will I still need to run the cleaner if I am starting from scratch (I am planning on doing a clean install on my Operating System 'Maverick') or would you advice to do the cleaner no matter what as a precaution?

  • MacBook pro not starting. LOTS of issues trying to login. Looking for any kind of advice, I'm at a loss..

    Basically my Macbook pro isn't starting up correctly. Every time I start it up, I get a loading bar. Once the bar is finished, the computer just shuts off. Sometimes when it loads without the bar - It instantly takes me to OSX Utilities instead of the normal login screen. From there, when i attempt to verify my Macintosh hard drive in Disk Utility, I get either one of two errors. First one being "incorrect number of thread records" and "Invalid volume file count". Once it finishes verifying, and I try to repair it, it says "Disk Utility can't repair this disk. Back up as many of your files as possible, reformat the disk, and restore your backed-up files". I have no time machine backups or a way to get into my computer to back anything up. Also, in disk utility, my hard drive will go from being greyed out to not being greyed out sporadically. If I have to erase everything on my hard drive to have a working computer then so be it. I just don't know if that's 100% what I have to do yet. I've tried every solution I've found to no avail. I don't have a second Mac or an external hard drive so i'm feeling beyond hopeless, especially with the fact that the nearest Apple store is hours away. Any help would be greatly appreciated.

    The OWC web site shows a number of HDD options and prices.  Other vendors can provide the same products.  This should give you an idea what is available and the approximate cost:
    http://eshop.macsales.com/shop/hard-drives/2.5-Notebook/
    Installing a HDD is quite easy.  Select your MBP from this list and watch the video:
    http://eshop.macsales.com/installvideos/
    You will need a #00 Phillips and a #6 Torx drivers for the installation.
    Ciao.

  • Looking for answer [ bit urgent]

    11. Consider this RMAN command:
    RMAN> CONFIGURE RETENTION POLICY CLEAR;
    What is the effect of this command?
    A. Backups will never expire.
    B. It removes any retention policy.
    C. The DELETE OBSOLETE command will fail with an error.
    D. It sets the retention policy to the default of REDUNDANCY 1.
    29. Which two statements regarding the control file and Recovery Manager are true? (Choose two)
    A. The control file can grow in size.
    B. The control file can store RMAN scripts.
    C. CONTROL_FILE_RECORD_KEEP_TIME determines retention time for RMAN records.
    D. The RMAN catalog can exist solely in the control file of the target database.
    73. What is the purpose of importing from an export, and specifying that no rows be imported and that the output goes to a log file?
    A. To verify space requirements in the target database before importing.
    B. To generate the SQL for the DDL operations that would occur during import.
    C. To check character set compatibility between the export file and the target database.
    D. To check for integrity constraint violations that would occur in the target database.
    Question: 92
    You want to drop the TBS1 table space from your database.
    You also want to delete the corresponding data files automatically, and not have to do it
    manually. What should you do?
    A. Use the DROP DATA FILE command.
    B. Use the DROP TABLE SPACE command.
    C. Ensure that all database files are Oracle Managed Files before using the DROP
    TABLE SPACE command.
    D. Ensure that the DB_FILE_CREATE_DEST initialization parameter is set before using the
    DROP TABLE SPACE command.
    Question: 93
    Which two statements regarding the control file and Recover Manager are true? (Choose two)
    A. The control file can grow in size.
    B. The control file can store RMAN scripts.
    C. CONTROL_FILE_RECORD_KEEP_TIME determines retention time for RMAN records.
    D. The RMAN catalog can exist solely in the control file of the target database.
    Question: 148
    You need to import all definitions of objects belonging to the TS_EMPLOYEES
    table space by using the export file expdat.dmp.
    Which import statement is correct?
    A. imp hr/hr TABLES=(ts_employees) rows=y
    B. imp system/manager FROMUSER=hr file=expdat.dmp
    C. imp hr/hr TRANSPORT_TABLE SPACE=y file=expdat.dmp
    D. imp system/manager TRANSPORT_TABLE SPACE=y
    TABLE SPACE=ts_employees
    Question: 168
    Your database runs in ARCHIVE LOG mode, and is backed up every Sunday night
    using RMAN scripts. On Friday your database crashes. Now you want to use the
    backups from last Sunday night to restore your database. How can you do this?
    A. You need to perform the restore manually, because your database was running in ARCHIVE
    LOG mode.
    B. Issue the RECOVER command from within RMAN. RMAN determines which data files to
    restore, and which archive logs to use.
    C. Issue the RESTORE and RECOVER commands from within RMAN. RMAN determines
    which data files to restore, and which archive logs to use.
    D. D. Issue the RESTORE DATA FILES, RESTORE ARCHIVE LOGS, and RECOVER
    commands from within RMAN.MAN determines which data files to restore, and which archive
    logs to use.
    What is the purpose of importing from an export, and specifying that no rows be
    imported and that the output goes to a log file?
    A. To verify space requirements in the target database before importing.
    B. To generate the SQL for the DDL operations that would occur during import.
    C. To check character set compatibility between the export file and the target database.
    D. To check for integrity constraint violations that would occur in the target database.
    Question: 221
    Which of the following statements is NOT true about RMAN ?
    A. It improves usability by enabling you to reuse the scripts to perform recovery operations.
    B. It detects block corruption while restoration and recovery operations.
    C. It enables you to perform block media recovery.
    D. It is capable to recover through unrecoverable operations, with only full database backups.
    Question: 246
    RMAN enables you to open the target database when it is already mounted. Which command
    must you execute at the RMAN prompt to open the database?
    A. ‘SQL ALTER DATABASE OPEN’;
    B. SQL ALTER DATABASE ‘OPEN’;
    C. OPEN DATABASE;
    D. DATABASE OPEN
    Question: 257
    Users in your development database complain that they are getting the following error while trying
    to execute a query on the SALES_HISTORY table:
    ERROR at line 1:
    ORA-00942: table or view does not exist
    While investigating the reason, you find that a hardware failure occured, resulting in the loss of
    one of the available disk drives used by the database. While waitinig for a replacement drive, the
    OBA removed the un-needed data from the database and during the removl the
    SALES_HISTORY table was dropped accidentally.
    Within few minutes a second hardware failure corrupted another disk drive, resulting in
    the loss of the current online redo log files and the logical back ups of the database. The redo log
    files were not multiplexed and the current redo log file is not yet archived.
    Which recovery method would you follow to recover the SALES_HISTORY table?
    A - Open Database complete recovery
    B - Cancel-Based incomplete recovery
    C - Change-Based incomplete recovery
    D - Closed Database complete recovery
    E - Recovery using the backup control file
    Question: 293
    You are using RMAN for backup and recovery of your database. You set the retention policy to
    NONE by executing the following command:
    RMAN> CONFIGURE RETENTION POLICY TO NONE;
    What would be the impact of this setting?
    A - The retention policy is cleared.
    B - RMAN does not consider any backup as obsolete.
    C - The retention policy is set to its default setting of redundancy 1.
    D - The retention policy is set to its default setting of recovery window].
    Question: 297
    Because your business requirements do not permit you to shut down the database to perform
    backups, you decide to perform online backups. You use the ALTER TABLESPACE .. BEGIN
    BACKUP command to perform the backups. The command returns the following error
    ERROR at line 1:
    ORA-01123: cannot start online backup; media recovery not enabled
    What could be the reason for this error?
    A - The database is in the MOUNT state.
    B- The database is in NOARCHIVELOG mode.
    C - The command was executed on the SYSTEM tablespace.
    D - The command was executed on a temporary tablespace.
    E - The command was executed on a read-onlytablespace.
    Question: 318
    Which statement is true regarding database writer process (DBWn)?
    A - It writes only committed data to the data riles.
    B - It synchronizes the database buffer cache and the data files regularly.
    C - It makes changes to data blocks in the database buffer cache when required.
    D - It is possible to configure more than one database writer process, but this is useful only on
    uniprocessor systems.
    Question: 328
    You work on a database that is used for application development and operates in ARCI-IIVELOG
    mode. As a DBA, you know that database downtime can be tolerated and have designed a
    backup strategy containing a weekly closed database backup. The local naming method is used
    by clients to connect to the database. Which files should you include in this weekly user-managed
    backup? (Choose all that apply.)
    A - control file
    B - sql.ora file
    C - archived log files
    D - tnsnames.ora file
    E - listener configuration file

    Got an exam coming up soon?
    If you haven't done so already, it would be a good idea to download the Database software and documentation (well, in good time before the exam anyway :)).

  • Ever since downloading and opening Firefox 4 beta, when I try to launch 3.6.8, I get an error message saying that Firefox is already running; it is not. I have removed 4.0 beta from the computer, but don't know where else to look for any bits and pieces.

    I need to restart the computer in order to launch FF 3.6.8. Also, in Dreamweaver CS5, I have defined FF 3.6.8 as my default browser, but when I try to view a page in FF, I get the same message that FF is already running. Where else do I need to look to find hidden files that are causing this?

    Did you uninstall the Firefox 4.0 beta version ?
    If you did then did you remove the personal data or otherwise removed to Firefox profile folder ?
    Make sure that you still have a (default) Firefox profile folder.<br />
    See http://kb.mozillazine.org/Recovering_a_missing_profile

  • Data binding in swing (looking for some pattern or advice)

    My primary window class looks something like this:
    public class PrimaryWindow extends JFrame {
       private final Controller controller;
       // GUI components definition code
       public PrimaryWindow () {
               // GUI components initialization code
               // GUI components controller installation code
       private class Controller implements XXX, XXX, XXX {
             public void propertyChange(PropertyChangeEvent event) {
                   if (OPEN_NEW_DIALOG.equals(event.getPropertyName())) {
                       SomeDialog dialog = new SomeDialog(/* Some data is sent to the dialog */);
                       dialog.setVisible(true);
    }The problem I have here seems to be a classic one, but i'm not sure how to solve it.
    When my controller receives OPEN_NEW_DIALOG event it sends some data into the dialog that is showed up the user. When user performs some actions I do not know what is the best way to send that data back to the controller.
    Yes there are millions of ways of doing this but i'm not sure which option is better, which one is more scalable and maintainable as well? In future I might have a dozen of dialogs and rather complex data structure they deal with, so what is the best way to bind GUI components with data model?

    Hi,
    Just to make it clear:
    We do not parse the XML on the event bean after the Coherence. We do it on the JMS adapter on multiple threads in order to utilize all the server resources (CPUs) and then we put it in the replicated cache.
    The requirements from our application are:
    - There is an aggregative query that needs to "see" all events (this means that we need to pass all events thru a single processor and we cannot partition them to several processors).
    - Because this is a HA solution the events on both CEPs (primary and secondary) needs to be at the same order when reaching the HA inbound adapter and the processor.
    - A single thread JMS adapter is not reading the messages from the JMS fast enough mainly because it takes time to parse the XML to an event.
    - Using a multi-threaded adapter or many single threaded adapters with message selector will create a situation that the order of events on both CEPs will not be the same at the processor inbound.
    This is why we needed a mediator so we can read in multiple threads that will parse the XMLs in parallel without concerning on order of messages and on the other hand publish all the messages on a single thread to the processors on both CEPs from this shared mediator (we use a replicated cache that runs on both JVMs).
    We use queue instead of topic because if we read the messages from a topic on both CEPs it will be stored twice on the Coherence replicated cache. But if we use a queue, when server 1 read the message and put it in the Coherence replicated cache then server 2 will not read it because it was removed from the queue.
    If I understand correctly you are suggesting replacing the JMS adapter with an event bean that will read the messages from the JMS directly?
    Are you also suggesting that we will not use a replicated cache but instead a stand alone cache on each server? In this case how do we keep the same order of events on both CEPs (on both caches)?

  • Hi looking for a bit of help with Aperture 3.1.2

    I have a digital image which has been taken in RAW. Is it possible to remove a unwanted brackground building from the image , can i aslo replace it with a different background.
    Manythanks

    That will depend on the image, how difficult that will be.
    You can replace parts of an image by copying details from other parts of the image using the clone brush. This works well, if the item you want to replace is isolated in front of a background with not much detail.
    If the background has plenty of structure close to the object you want to remove an external editor would be preferable, for example Inpaint is easy to use and fills in the space left by removed objects nicely, also PhotoShop Elements is good for this kind of retouche.
    At the App Store:  Mac App Store - Inpaint 5 - iTunes - Apple

  • Looking for some internet hosting advice.

    I am working on a website and I am trying to get an idea of
    what to expect in the future. If I wanted to add a video sharing
    area to my site, like YouTube, what would be the most
    cost-efficient way to do it? I would need a very large amount of
    disk space and a very high bandwidth transfer. I don't know much
    about internet hosting, but I have been reading into it. It seems
    to me that I would need to use one of these colocation facilities.
    Is that right?

    Why not just use YouTube? Put all your videos up there...sure
    would save a
    bunch of money and time.
    Dan Smith > adobe community expert
    http://www.dsmith.tv
    "AngryCloud" <[email protected]> wrote in
    message
    news:fgqovq$7rg$[email protected]..
    >I am working on a website and I am trying to get an idea
    of what to expect
    >in
    > the future. If I wanted to add a video sharing area to
    my site, like
    > YouTube,
    > what would be the most cost-efficient way to do it? I
    would need a very
    > large
    > amount of disk space and a very high bandwidth transfer.
    I don't know much
    > about internet hosting, but I have been reading into it.
    It seems to me
    > that I
    > would need to use one of these colocation facilities. Is
    that right?
    >

  • A bit of advice? Java3D and JMF

    I am looking for a bit of advice. I am developing an art project here at Portsmouth University and it is based on the user driving through a �D environment using a joystick. WHen they hit an object in the Java3D space then I want to play the piece of video associated with that object. When the viedoe ends I want the 3D space to come back and carry on and so on and so on.
    At the moment I ahve the 3D part working but I am having trouble working out how to open and close borderless windows to play the viedo in - the aim is that bothe parts will operate in fullscreen form.
    Any advice or help would be most grateful,
    cheers
    Reuben
    [email protected]

    Stick to microsoft office. The macbook comes with a free 14 day (almost positive that it's that long) for both Office and iWork. No one can beat Microsoft Office because everyone already uses it and Office on the mac works seamlessly with pc's when transfering files. Also, with the purchase of office, you get 3 licences so you would be able to split the cost of it with 3 people/3 different computers. I have been using Macs for years and Microsoft Office works very well on the mac and you would easily be able to work with your students without worrying about compatibility problems.
    I am sure Apple's iWork is great (obviously keynote is excellent) but depending on what you wish to do, Office might just be the easier solution.
    If you look at the reviews of iWork you will notice many people love it, mostly for Keynote, and say that Pages needs work.

Maybe you are looking for

  • Excisable material: Excise  invoice not entered at the time of GR (MIGO)

    All SAP Gurus, By mistake we have not entered an Excise Invoice at the time of GR (selected no Excise invoice), now we want to post the excise invoice in our system. What can be done for this? Regards,

  • User / Group Problem

    WE run a 10.6.4 Server and have an issue with one user- No matter what we do we cannot seem to get them be be part of a Group. WE created a group and puut all Office members in the group- All OK- (This is using OD) All services fine DNS Fine, mail fi

  • MacBok pro Audio line in port  doesn't work for microphone input Why?

    I turn line-in port  on in System preferences/sound but no reaction. Using within third party applications like Hear or Amadeus the recording via head set microphone is without problem. What is wrong with the Mac os ?

  • Captivate 5 Crashing while opening previously edited file from the same day!

    I have today been working on a simple Captivate 5 file. At the time of crashing it had around 9 slides and a one question quiz as I hadnt done much work on it. Im running Captivate 5 on a Windows XP 32bit machine with 4gb RAM and a capable processor.

  • WLSE support of Novell LDAP server NDS

    Hi all, It seems that WLSE (tested with 2.12) generates LDAP search packets that are not compatible with Nortel LDAP server called NDS. NDS is not designed to give the Userpassword in a reply of a ldap search as it is requested by the WLSE. I did not