Power input specs for MacBook Pro

Anyone know if Apple have (or are going to) released information on the actual power input requirements for the MacBook Pro ? I specifically mean for the machine, NOT it's AC adapter.
They came tantalisingly close for the 17" PowerBook with this :
http://developer.apple.com/qa/qa2001/qa1266.html
I suspect the answer is going to be NO, if so then I would suggest they reconsider their policy - making up new proprietry connectors and restricting the supply of third party products like this is really having an effect on their image. People DO notice this sort of thing, and suggest they've been taking lessons from Microsoft in how to restrict people/force them to buy more than they intended.
Given that I've a box full of dead Apple supplies for PowerBooks, some of which have already been repaired and given a second life, then I'd rather put off buying a MacBook until I know I can either make, buy, or adapt a third party supply (at a reasonable cost). I'm powering my PowerBoook now off a third party supply that seems better built and was half the price of an Apple supply. Plus I need three, one to live under the desk at home, another to live under the desk at work, and a third to go around in my case - it makes life so much easier. I've no intention of shelling out for three extra Apple supplies (two extras and a spare for WHEN one packs in).

You might want to ask this in the MacBook Pro forums… you're in the MacBook forums.

Similar Messages

  • Power input specs for the zen x

    i need to know the power input specs for the zen xtra, since i need to buy a new charger ASAP. Can anyone help me?

    You might want to ask this in the MacBook Pro forums… you're in the MacBook forums.

  • Does anyone know what is the exact HDD model and specs for MacBook Pro (15-inch, Mid 2012)? Thanks

    Does anyone know what is the exact HDD model and specs for MacBook Pro (15-inch, Mid 2012)? Thanks.

    Thanks for responding me,
    I just got this info from the link that you provided me but is there any model name or model number for it?
    or any 2.5 would be work?
    Thanks again.

  • Incompatible Changjie Input Method for Macbook Pro Office for Mac

    I have Chinese word input problems when I use my Macbook Pro 13" Retina OS X  and Microsoft Office for Mac Standard 2011 with Service Pack 2.
    When I use Changjie input method to input some Chinese words like "面", "屬", "應", these words cannot be shown with correct input methods. They can only be shown by Quick input method. It is very strange. No such problems exist when I use my iPod, iPad or iPhone 5. Please advise. Thank you!
    For your reference, Changjie input method of the above words are:
    面 = 一田卜中
    屬 = 尸卜卜戈
    應 = 戈土心
    These words cannot be shown by the above methods.

    PS OS X Cangjie does seem to use different codes for those characters:

  • POWER CORD DISASTERS FOR MACBOOK PRO'S AND MACBOOKS

    What is going on with the power cords and the MacBooks? I have noticed more and more questions about them and now I am mad enough to put my words out there! I have been a faithful Mac user and this is my second. This is, however, not my first problem with their cords. I have been told by a professional that the shafts for the wiring are far too stiff and that is why they keep malfunctioning. This is why many of you have exoposed wiring (very dangerous) and why the wiring is pulling away from both the wall outlet and the plug for the machine. I am now, furious, as I am in the middle of a huge design project and my local dealer (only 1 in a city of 1 million) tells me that Apple is "reconfiguring" the cord and they don't know when it will be available. So where does that leave me or you? I have no power to my MacBook Pro that I spent over $5,000.00 for and no way to get it!! Does anyone out there have any secrets or can you offer any help at all? The next thing you know we will be talking about Apple the way most of us talk about Dell. I mean, c'mon, such a simple problem but not one of the multi-millionaires has done anything to correct it? Any help or suggestion would be greatly appreciated!!

    Broken Keys? Really? On a Macbook? How hard do you type?
    I have owned an iBook (5 years), a 17" PowerBook (4 years), a 15" MacBook Pro (3 months), and a 24" iMac (1 year). So far, the ONLY problem I have had is a bad airport card in the MacBook Pro, which apple promptly replaced at no charge.
    If you are not getting good service from your apple store, call apple directly. I find they always resolve the problem. If you get an answer you do not like, talk to a supervisor, and keep going up.
    My brother-in-law, whom is much younger than I, owned an iBook and severely (and I mean severely) abused it over a two year period. Broke the screen twice (repaired at no charge), shattered the keyboard (replaced, no charge), cracked the case (replaced, no charge), tore the power cord in half (replaced, no charge), and finally, on the next case break, Apple gave him a brand new MacBook at, again, no charge.
    As my company provides me with laptops from other manufacturers (HP, Dell), I can say without reserve that the Mac is by far one of the best built machines (maybe not as tough as a Panasonic ToughBook...) on the market today. The problems I have had with my Dell Latitude over the past four months (bad mouse, keyboard, fan, hard drive, in that order) makes my macs all that much more wonderful.
    Also, what computer comes with free word processing software, besides perhaps a Linux Box? You pay for it somewhere...

  • Power/AC Adapter for MacBook Pro

    I have both a MacBook and a Macbook Pro computer. My Pro AC adapter is broken. Can I use my MacBook adapter on my MacBook Pro?
    The MacBook is a 60W and the Pro was a 85W adapter.

    Although it will work you do run a certain risk of overloading the adapter because it cannot both run the computer and charge the battery. You should get a replacement for the MBP. You can use the MB adapter while waiting for the replacement, but be sure to monitor how hot it gets. Obviously it was not designed for the MBP.

  • I need a new power management board for MacBook Pro.   The AC 7000 chip is blown from power serge.  Where can I get one in Fiji?

    Where can I get my power management board repaired ...replace the AC7000 chip ( that now has a little hole in it from a power serge ) or replaced in Fiji?

    Actually, this is how I do my projects   . . .  I pull together all the assets  (video clips, stills, graphics) and tag them in a database.  Then, I can pull them into various segments.   I learned the ctrl+m five years ago when it was suggested on the old forum by some guy named named Steve Grisetti.
    Example  - - -  I've done multiple soccer videos.  There are maybe 16 players on a team...  each is a tag.   There are great headers  . . . that's  a tag . . . don't forget awesome defensive plays  . . .  tag.   A tag for screwups / funny.    A tag for regular season play, a tag for post-season playoffs, etc.   
    This allows you to build it as you go.   So, as you start to compile a season end video, it's relatively simple to pull content.    Oops, you review the segments and see that one kid's hardly included... select the tag with their name and you can pull in a few more clips.   If you're documenting a season, you can see how the database is coming along and determine you need more footage of certain situations and then adjust the shooting priorities at the next couple games, etc.
    As you build the collection, possible themes come...  perhaps a song or two that might add an element or tie things together.
    SO...  goal is to assemble a collection of decent and tight clips  (leaving room for handles on each).  Tossing out all the superferlous stuff.    In shooting a 90 minute soccer game, there can be times when I end up with only  ten minutes of visually interesting stuff.
    I'm also compiling content to be used in a video for a cool company here in Seattle.   Different thing altogether, but will take a similar apporach (fewer digital assets, however).
    I don't usually take assets from one project and put onto another  . . .  especially when doing youth sports, this could create issues.

  • Recommended specs for MacBook Pro - beginner photo/video editing purposes

    I'm shopping for my first Mac and was hoping to get some advice on the specs I would want for running software to edit photos and video. I'm a beginner/non-professional but hoping to develop some skills.
    I was thinking 8 GB RAM, a mid-sized solid state drive, and a quad core i5 or i7 processor?
    Any advice would be much appreciated. Thank you!

    I think you've nailed them already. Buy and enjoy.

  • What connector do I need for Macbook Pro to In Focus Projector? I understand it does not have HDMI input.

    What connector do I need to use for MacBook Pro to an In Focus Projector to show a PowerPoint presentation?
    I understand the projector has a "regular video input", S Video Input, but no HDMI input.
    Thanks

    Check out my post on how to output surround sound through your Mac.
    https://discussions.apple.com/thread/3639822
    that should be able to help you

  • May I use the power adaptor for Macbook pro into Macbook Air?

    May I use the power adaptor for Macbook pro into Macbook Air?

    Yes.  You can use one of a higher wattage, just not a lower wattage.
    Here's the full info.
    http://support.apple.com/kb/HT2346
    Regards,
    Captfred

  • If I buy Microsoft office for MacBook pro will I be able to use diacritical marks for Welsh input? Welsh requires a circumflex sometimes on a,e,i,o,w and y, in addition to a diaeresis. An acute accents are not a problem as they occur in other languages.

    If I buy Microsoft office for MacBook pro will I be able to use diacritical marks for Welsh input? Welsh requires a circumflex sometimes on a,e,i,o,w and y, in addition to a diaeresis. An acute accents are not a problem as they occur in other languages.

    You can add in System Preferences, Language & Text, Input Sources, Welsh keyboard

  • Partial power cord for MacBook Pro?

    I have a broken power cord on a MacBook Pro 13-inch early 2011 model. Is there a way to buy the part of the cord that attaches to the computer without shelling out $79 for the whole thing with the power block?

    They are for sale on eBay.
    But how do you propose to connect it? The connections are inside the power block, which is glued shut. There is no simple plug, these cords require soldering.
    Is the cord at the computer-end frayed? it might be replaced as a safety issue if frayed.

  • What's the power Adapter for Macbook pro 13inch Mid 2012

    What's the power Adapter for Macbook pro 13inch Mid 2012 with core i-7, 2.9ghz, 8Gb ram?
    AFAIK it should be a 60wat Megasafe power adapter.
    But mine shipped with a 45Watt Megasafe. I got it as a Gift from my friend.
    Thanks in Advance.

    mmaumio wrote:
    60W MagSafe power adapter with "L" style connector
    This should be my Adapter right?
    Yes.
    There is a drawback in addition to taking a longer time to charge up your MBP.  In unusual instances when using your MBP with power adapter attached, and running a very heavy load on the CPU/GPU, the MBP will require additional electrical resources in addition to what the power adapter can provide.  It will then draw upon the battery.  What this means is that using a 45 watt adapter, these conditions are more likely to occur.
    Using a 45 watt adapter should not harm your MBP as such.
    Ciao.

  • How do i use the headphone jack as an input on a macbook pro 9,2.... the option just isn't in the sound app.

    how do i use the headphone jack as an input on a macbook pro 9,2.... the option just isn't in the sound app.
    all i have is the internal mic option, can anyone help?
    thanks

    You should also ask this in the MacBook Pro forum. This is the forum for the white and black plastic MacBooks that were discontinued in 2010. You should also post this question there to increase your chances of getting an answer.
    https://discussions.apple.com/community/notebooks/macbook_pro

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for