Recommendations needed for PDA

Hi,
I wish to evaluate xMAM for Utilities 7.0 SR1. In that I specifically want to look at
1. GIS/GPS integration.
2. Push messages.
3. RFID capabilities.
Based on my understanding I have realised that I need a device which has
1. Windows Mobile 5.0 (Arcpad which is required for GIS is not supported on Windows Mobile 6.0)
2. GPS receiver
3. Minimum 64MB RAM (128 MB is desirable).
4. ARM/XScales/Samsung S3C processor.
5. Minimum 2GB flash memory.
I had shortlisted on the following series of devices
1. HP iPAQ hw6940/hw6945 Mobile Messenger
2. The Hp iPAQ rx5900
Please help me with the recommended devices/comments on the devices I mentioned above.
Helpful answers shall be rewarded.
Thanks in advance,
Nakul Rajurkar

EDIT : Windows Mobile 6 officially supported by SAP (Link):
I feel that the HTC Advantage (Athena)- (Also Known as T-Mobile Ameo) or the HTC TYTN II (Kaiser) - (Also Known as T- Mobile MDA Vario III, AT&T Tilt) should fit the bill. Though SAP does not officially support Windows Mobile 6 or 6.1, the architecture is an improvement of Windows Mobile 5 and most of the apps coded for Windows Mobile 5, work in Windows mobile 6. I give below the details of the two devices. HTC by the way is the ODM (Original Device Manufacturer) for many of the best PDAs till date - some models of HP, i-mate, O2, T- Mobile, AT&T/Cingular were made by HTC.
HTC Advantage X7501
Highlights
Microsoft® Windows Mobile® 6 Professional with Direct Push Technology
624 MHz CPU
Built-in 8GB hard drive with miniSD™ expansion slot
Laptop-style experience with a huge 5-inch touch screen display and detachable QWERTY keyboard
Always “on”, connect to your office, watch videos or listen to music anywhere
Built-in GPS
Tri-band UMTS/HSDPA and quad-band GSM/GPRS/EDGE
Bluetooth® and Wi-Fi®
3 megapixel camera with auto focus and flash
HTC VueFLO™ for easy navigation
TV Out lets you output screen contents to an external viewing device
Hardware:
Intel® PXA270 624 MHz with ATi™ Graphic Chip W2284
Microsoft® Windows Mobile® 5.0 Pocket PC Phone Edition
ROM: 256 MB;RAM: 128 MB SDRAM
133.5 mm (L) x 98 mm (W) x 16 mm (T)
Thickness with keyboard: 20 mm
359g (with battery)
5Inch 480x640 resolution,65536 Colors transmissive TFT-LCD with backlight LEDs, touch-sensitive screen
HSDPA/UMTS (2100 MHz for Europe, 850/1900 MHz for USA);Quad-band GSM/GPRS/EDGE: 850, 900, 1800, 1900 MHz(The device will operate on frequencies available from the cellular network)
5-way Navigation Control
HTC VueFLO motion sensor assisted browsing experience
Dual usage QWERTY keyboard for text input and display protection
Bluetooth® 2.0,Wi-Fi®: IEEE 802.11 b/g
HTC ExtUSB™(11-pin mini-USB and audio jack in one)
HTC proprietary 16-pin combined port (USB 1.1 host/VGA and TV Out)
Main camera: 3 mega-pixel camera with autofocus and flash light
Second camera: VGA CMOS imaging sensor
Audio Built-in/Dual, Hands-free (microphone and speaker)
Headphone: AMR/AAC/WAV/WMA/MP3 codec
Battery Rechargeable Lithium-ion battery ,Capacity: 2200 mAh Standby time: Up to 300 hours (for GSM/UMTS)
Talk time (Screen off):Up to 5.5 hours for GSM;Up to 4.5 hours for UMTS;Expansion Slot *miniSD™ (Hot swap and SDHC compatible)
AC Adapter Voltage range/frequency: 100 - 240V AC, 50/60 Hz;DC output: 5V and 1A
HTC TYTN II
Specs and Tech Info
Qualcomm MSM 7200, 400MHz
Windows Mobile 6 Professional
ROM: 256MB (accessible 145.24MB), RAM: 128MB
Dimension: 112mm (L) X 59mm (W) X 19mm (T)
Weight: 190g with battery
Display: 2.8", 240 X 320 QVGA TFT-LCD display with adjustable angle and backlight
Network: Tri-band HSDPA/UMTS (850, 1900, 2100 MHz), Quad-band GSM/GPRS/EDGE
Device Control: Finger scrolling and panning, 5-way navigation control, 3-way Jog Wheel
Keyboard: Slide-out lit QWERTY keyboard
Keyboard Layout Pictures
Connectivity: Bluetooth 2.0, WiFi 802.11b/g, HTC ExtUSB
GPS: Built-in GPS and connector for external antennas, A-GPS supported
Camera: 3MP CMOS color camera with auto focus on the back, front VGA CMOS color camera (for video calls. No front Camera on AT&T Tilt.)
Audio: Built-in mono microphone and speaker
Audio Output: Proprietary jack
Battery: 1350mAh rechargeable Li-polymer battery, shape: KAIS160 (35H00088-00M)
Expansion Slot: MicroSD(SD2.0 compatible, MicroSDHC compatible up to 8gb tested)
AC Adapter: 100-250V AC, 5V and 1A DC
Best Regards,
Veera
Edited by: Veeraraagavan R on Mar 15, 2008 7:24 AM

Similar Messages

  • Recommendation Needed For Netweaver Administrators

    hi,
    I am the Basis manager for a shop currently running 4.6c & 4.7.  We are upgrading our BW systems to Netweaver2004s. 
    Can someone recommend training for my Basis people that will help them to understand NW and all its components ?
    Thanks Rob
    [email protected]

    Hi
    For ugradation, check the documentation & pataches  from here
    https://websmp208.sap-ag.de/upgrade
    If you want to know more documentation about NW, check here
    http://help.sap.com/saphelp_nw04s/helpdata/en/ee/275c42b4e05542e10000000a1550b0/content.htm
    1) People Integration
    2) Information Integration
    3) Process Integration and
    4) Application Platform.
    People Integration
    refer this link for more help for Portal
    http://help.sap.com/saphelp_nw04s/helpdata/en/42/bfa145731b1d64e10000000a1553f6/content.htm
    refer for Mobile application Help
    http://help.sap.com/saphelp_nw04s/helpdata/en/8c/555a421b5ec153e10000000a1550b0/content.htm
    Information Integration
    http://help.sap.com/saphelp_nw04s/helpdata/en/31/555a421b5ec153e10000000a1550b0/content.htm
    Process Integration
    http://help.sap.com/saphelp_nw04s/helpdata/en/5f/555a421b5ec153e10000000a1550b0/content.htm
    Application Platform
    http://help.sap.com/saphelp_nw04s/helpdata/en/97/68d64260752a78e10000000a155106/content.htm
    Cheers
    Jawahar Govindaraj
    PS:Reward pts

  • Recommendations needed for portable hard drives

    Looking for a recommendation for portable hard drives -
    1. I'm buying a new 2TB portable hard drive to use with my iMac for my Time Machine backups.
    2. Additionally, I am buying a second 2TB portable HD for the iMac for SuperDuper back ups (I'm adding a second layer of back up and bootable clone protection to my life).
    3. Finally, I need to also purchase a 1TB portable HD for SuperDuper back ups for my MacBook Air.
    I'd just as soon keep life simple and buy the same brand for all 3 drives. I want things easy.
    (I have Mavericks on both computers and don't want to worry about Western Digital software inadvertently being installed without my knowing it, possible causing me to lose data on my computers. So maybe it would be simplest all around to avoid WD?)
    Simple and easy and reliable - that's all I ask.

    Information.
    Best external hard drive?

  • Recommendation needed for VOIP phone and apple extreme

    I have been with Packet 8 phones for a few years, but they say their phones have problems with Apple Extreme which I just bought.
    So I need to change companies. Anyne have some good recommendations so I don't have to go through this again? Torture. thanks!

    I'd like to "piggyback" on this question. I have the original "family share" plan, (almost 10 years now) I had the only smartphone going back to the Blackberry Curve when that was the "thing" many years ago, so I still have unlimited data on my Razr Maxx. I recently got my wife her first smartphone, with the 2GB plan, last month she used it mostly at home on wifi so she used 0GB my bill which includes a standard phone which was used by my daughter and I'll cancel to reduce my bill, which is now $183. As I look at the shared data plan for even 4GB, (I'm a pretty heavy user with no wifi at work) it would be $180 plus tax. Seems like I'm better off where I am canceling the odd phone will save me what $30 a month?
    Less than I could get on any shared data plan that would cover my usage and her minimal data use. BTW, I have unlimited taxt, she has 250 for $5 a month that she never goes over, and we hvae 700 shared minutes which we haven't come near even when there were 3 of us calling. Any suggestions will be welcome!
    thanks,
    Joel

  • Hardware Recommendation Needed for HRMS iRecruitment

    We are deploying the HRMS iRecruitment module.
    I am trying to spec out an external (dmz) web tier server.
    Is anyone using the SunFire 1200?
    I appreciate any hardware suggestions.
    Thanks for your time.

    That's right,
    You definitely need to talk to the vendor, looks like their website is hosted on Windows Server with ASP and they just announced Microsoft Partnership
    http://www.hrms.com/DesktopDefault.aspx?tabindex=13&tabid=15&iid=55

  • URGENT Portable HD Recommendations needed for G4 Powerbook

    PLEASE HELP
    I would like a portable HD to back up and carry my itunes and special files with me on holiday etc...
    I brought an enclosure for an old powerbook HD which was nice and small, but while it powers up when plugged into my Ebook it won't when plugged into my powerbook. Appears that the powerbook does not have enough power to run it or something (of course, being portable, it has no external power supply). Any Ideas of brands that work.
    Thanks

    I use a 120gb Seagate FreeAgent Go. Most of the time it is connected to my AEBS, but I connect it directly to the PB when importing multiple CD's or when on the go. The first portable drive I tried was a Maxtor OneTouch 4 Mini, but returned it as it required more power than the PB USB ports could put out. I've had this setup for about a year now.
    I recommend getting a second Firewire drive and backup software such as Super Duper or Carbon Copy Cloner to backup your PB and portable drive.
    Hope this bit of info helps.
    Mondy

  • Recommendations needed for document management app

    I want to be able to mail text files in various formats (*.pdf, *.html, *.docx etc) to my iPad, where the
    files will then be displayed by title.  I also want to add a couple of sentences of annotation to each item. 
    I should then be able to display any given item with a click or tap.
    I can mail files to my ibook app right now OK but I can't see any way to annotate an ibook entry and I
    really need that.  
    To review:  Imagine that I am working from my desktop.  I see a file I want to save to my iPad.  I
    download it to my PC and mail it as an attachment to my icloud account.  I go to Mail in my iPad
    and tap the 'Move' icon. The 'Move' icon gives me the opportunity to save it to the document management app,
    whatever it is called.  I then go to that app and annotate the saved file. The annotation appears next to
    the file title.  When I tap the entry the file displays. 
    I assume the right name for an app like this is text management or file management or document management.
    What does this???
    Thanks,
    Fred Hapgood

    I do a lot of counselling about a very complicated and dynamic subject.  Right now I have to lug 20-30 pounds of reference texts from point A to point B to point C.  I bought the iPad Air in hopes I could store this material in the tablet.  But the reference material is complicated -- I guess I said that -- and I need lots of words to clarify what the subject is of each pamphlet and brochure, etc, before I can clearly differentiate one from the other.  Imagine I have documents A, B and C.  In the best of all worlds I would see a metadata display that looked like this:
    File A -- Comments
    File B -- Comments
    File C -- Comments
    Taking the filenames and the comments together I decide I need to look at C. I tap that and it displays.
    That is the best of worlds.  But I see GR allows me to rewrite filenames and maybe doing that will get me to where I want to go.
    It does seem strange that with all document-handling packages out there there isn't one that allows comments in metadata.  Oh well.
    Thanks again,
    Fred

  • Recommendations needed for routers (ibook G4 + PC that is not wireless)

    I have a ibook G4 (1.42 GHz PowerPC G4) and I'm running mac os x 10.4.11 and my roommate has a PC which is not wireless - we are looking for a router that would be compatible with both. Can anyone make any recommendations?

    Casey, Welcome to the discussion area!
    Pretty much any inexpensive wireless router would do what you require.
    Also Apple's AirPort Extreme base station (AEBS) and Time Capsule would meet your requirements. Apple's AirPort Express (AX) would not since it only has a single Ethernet port and therefore would not be able to support your roommate's PC via Ethernet.

  • Recommendation needed for duplicate clean-up and photostream settings

    Good day. We have 2 iphones and macbook and an iMac. The iMac is our main photo repository.  However, it has become overpopulated with photos. In iPhoto, I have the automatic import selected, so I have all kinds of duplicate photos now.  I also imported all my wife's photos from her iPhone too.  Now I'm going through 1 by 1 to sort, move photos to events, remove duplicates, etc.
    I think I'm good on the settings moving forward, but I'm looking for a way to efficiently review and remove photos.  Any recommendations on this? 
    The other question I have is once IOS photos are imported and tagged with 'photostream' on my iMac - I assume I must delete these to remove them permanently, ie - they are not part of my 1,000.  Once they are imported to the iMac from photostream - they are on there until I delete them correct?

    You can use one of these applications to identify and remove duplicate photos from an iPhoto Library:
    iPhoto Library Manager - $29.95
    Duplicate Cleaner for iPhoto - free
    Duplicate Annihilator - $7.95 - only app able to detect duplicate thumbnail files or faces files when one library has been imported into another with iPhoto 8 and earlier.
    PhotoSweeper - $9.95 - This app can search by comparing the image's bitmaps or histograms thus finding duplicates with different file names and dates.
    DeCloner - $19.95 - can find dupicates in iPhoto Libraries or in folders on the HD.
    OT

  • Recommendations needed for a possible bluetooth transmitters

    I have an iPod Classic load with music.  I want to connect it to my bluetooth portable speaker instead of relying on streaming from my phone.  Does anyone have some suggestions that are reasonably priced?

    The battery.
    The 1/2 AA battery should measure 3.2 Volts or more in your Hand, or 3.1 volts or more in circuit with the main power plug removed. If it does not, you are not likely to start this Mac. They measure 3.6+ Volts new.
    Next, press the CUDA Reset button (near the battery, next to the button labeled Reset) in one operation (no momentary presses) and hold for about 15 seconds.
    Next, use a keyboard. From power off, hold down 4 keys:
    Command Option P R
    and momentarily press the power key. Continue to hold the four keys until you have heard 4 sets of chimes.
    The chime is generated in software, and indicates tests passed and booting is likely (if a boot device can be found). The more extensive memory tests which follow may still find serious problems. If no memory is installed, or bad memory is installed, you will hear other noises.
    There is a diagnostic LED near the processor socket. a properly operating processor will change it from its initial bright to flickering nearly-off.

  • Recommendations needed for using VNC

    I've been testing out a couple of VNC hosts/clients amongst my two workstations, as a means of being able to control my older (read: slower and now lonely) workstation from my newer workstation for various and sundry tasks. I'm not actually trying to edit across the network, but I'd like to be able to manage files, set up encodes, and other fairly lo-fi tasks.
    Currently, my computers are networked using the router that is part of the DSL modem I use. Unfortunately, this is only a 10/100 router, and it's pretty slow, both in file copying terms and in general operation. My open-ended guess is that if I bumped up to a GigE switch/router, I'd be able to perform these actions a little more fluidly--right now, there is significant lag in operation and redraw in the VNC client window.
    I've tested out UltraVNC and TightVNC. UltraVNC is a bit "bubblier" but hasn't been updated in awhile and lacks a cool feature that TightVNC has: a file transfer window. It's not as slick as drag-'n'-dropping from the client computer to the host computer, but it's sort of a Java FTP window that lets you navigate the drives on both machines and copy files betwixt them. For this reason, I like TightVNC better (the free price tag helps).
    What I'm wondering is if there is a better/faster method of doing this, or if there are other suggestions for VNC software to use? I know Windows has the built-in VNC (Remote Desktop, I believe), but I've always disabled that since it's otherwise running in the background. I can control other VNC apps a little bit more tightly, but they're not quite as "integrated" as RD would be, I imagine. Are there any other VNC packages I should be looking at, or do you have any suggestions as to how to best outfit this setup? I'm looking at getting a basic Netgear GigE switch to increase the connection speed between my systems, but I'm open to other suggestions.
    Thanks in advance.

    Colin,
    The free version works good! Try it!
    I have used it a lot helping my father with his computer when he lived in the US (I live in Norway, and btw, now my father does to). I have also used it on my LAN, and both uses have been smooth and very useful!
    Now, if I ever were going to help a client over the internet with his computer, I would have charged my client for the cost of the program. If you define your use as a "personal use", it's up to you.
    Dag

  • What adapter do I need for my ipod Nano 7th Generation to connect to a Sony home docking station (30 pin). I purchased the one recommended (Lightning to 30 pin adapter), but it says 'this accessory is not supported by this device)?

    Could someone please tell me the correct lead I need for an Applie Ipod 7th Generation 16GB for a Sony docking station. I bought a Lightning to 30 pin adaptor that fits the dock but not the ipod (this was recommended to me by someone from the Apple shop believe it or not). I need one that will fit the ipod and then slot into the 30 pin dock. The dock pulls out and my old ipod (5th Generation) just slotted straight in, but this slot obviously doesn't fit. It would really help if someone can recommend what I need to use or even if there is one that just slots in or whether I need some sort of cable and can't use the docking station. I've had a lock at the Apple store but just keep getting confused about what does what and can't seem to see anything unless I need an additional cable to slot into the 30 pin adapter I already have?
    HELP - CONFUSED.COM!

    If it is a lightning to 30 pin adaptor, and you have a 7th Generation Nano it has to fit the Nano.
    This is lightning to 30 pin adapter: http://www.bestbuy.com/site/Apple%26%23174%3B---Lightning-to-30-Pin-Adapter/6651 936.p?id=1218803450821&skuId=6651936#tab=overview
    Is this what you bought?
    You need to contact Sony and see if they model you have is compatible with the docking adapter. It may not be.

  • I want to transcribe one audio file of a lecture into text. I don't have a need for extended use so can anyone recommend how to do this free? Thanks

    I want to transcribe one audio file of a lecture into text. I don't have a need for extended use so can anyone recommend how to do this free? Thanks

    Mike,
    I was successful, in a test I just conducted, to get Siri to record your problem statement in a Note file on the iPod as I used the Edit > Speech feature in Safari to play the text. I don't see why dictation wouldn't work as well. Why not give it a try?
    If you don't have an iOS device to try this with, you could write your audio file to a CD and use an external player to get audio to the Mac.
    Jerry

  • Is virus protection need for the iMac, and if so, which product is recommended?

    Not sure about virus protection of the i Mac, any recommendations?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the left side of the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Looking to replace my Mac Pro 2.1 graphics card with one that is silent with at least 2 DVI outputs (needed for audio production), any recommendations?

    Looking to replace my Mac Pro 2.1 graphics card with one that is silent with at least 2 DVI outputs (needed for audio production), any recommendations?
    Thanks

    Thanks, but are these are silent?
    Why do they cost over 10 x what seems available for PC?
    Is it not possible to flash the cards for mac?
    Something similar to a ASUS Geforce 8400GS PCI-E 2.0 512 MB DDR2 Graphics Card EN8400GS Silent/P/512M?

Maybe you are looking for