What could i use my eMac for?

So i basically ordered an eMac online. Its in perfect condition and still working like a charm. its the original 2002 model. 700mhz 40gb and 512mb ram. and unfortunately cd drive. it can't read dvds. i wanted to set it up as an entertainment system sort of. but now with cds only...no thank you. Does anyone have an idea on how i could set this thing up maybe? Thank you

its the original 2002 model. 700mhz 40gb and 512mb ram.
We have that same 2002 model that is running OS 10.4.11 and with 768MB RAM. It's not capable of much today--ours is sitting unused downstairs while I work out a "repurpose" or "scrap it" plan that takes in these factors:
1) I don't want to throw money at it to increase the RAM or hard drive capacity
2) The display quality on ours is quite nice so it could make a decent iTunes jukebox with visualizer, but the small 40GB hard drive doesn't hold a lot.
3) It is miserably slow on the web so any web-based function is a no-go.
So far, the only redeeming quality is that it will boot OS9 natively and is a very fast OS9 machine. We have a lot of older pre-OSX kids games and educational stuff left over and now have grandkids. It may well become their game and learning center.

Similar Messages

  • What could be the possible reason for a deployed application to run slow after the target pc comes out of standby mode?

    What could be the possible reason for a deployed application to run slow after the target pc comes out of standby mode?  PC running XP and using the USB to communicate with the DAQ and driver boards.  Application generated with 2010.
    Thanks

    Hello,
    Usually default property is checked 
      system property -> devices ->usb root -> power management -> allow system to switch off device
    Hope this help
    Regards
    Tinnitus
    CLAD / Labview 2011, Win Xp
    Mission d'une semaine- à plusieurs mois laissez moi un MP...
    RP et Midi-pyrénées .Km+++ si possibilité de télétravail
    Kudos always accepted / Les petits clicks jaunes sont toujours appréciés
    Don't forget to valid a good answer / pensez à valider une réponse correcte

  • Good night, I am just starting in bussines design, i am not rich enough to buy photoshop license, but i'm loved to use photoshop, could i use photoshop cs2 for free version? Thanks alot for your attention.

    Good night, I am just starting in bussines design, i am not rich enough to buy photoshop license, but i'm loved to use photoshop, could i use photoshop cs2 for free version? Thanks alot for your attention.

    There is no free version of CS2.  There is only a special version of CS2 available for people who purchased it and need to reinstall it.

  • What could be the Approximate time for HRMS Implementation?

    Dear Friends,
    Any clue on What could be the Approximate time for HRMS Implementation?
    Modules:  Core HR, Payroll, SSHR & OLM
    Bahrain Legislation
    2 Functional
    1 Technical Resource
    Integration with Third Party system for Financials..
    Anyy approximate time pls..
    Guru

    Hi Guru,
    Difficult to estimate these as each legislation is different.
    I also presume, Bahrain is not a seeded legislation.
    So you will have to write all the tax rules and reports.
    But, as the Tax/NI rules for GCC are fairly simple, should not be difficult.
    Best way to go about it, is to do it in phases.
    Core HR - BG configuration, Person migration, Absences etc.. and finally any reports for HR
    Payroll - elements, balances, formulas and all the logic.. and then all the reports.
    Once HR and payroll are done.. SSHR and OLM should take 1/3(or 1/2) of the time you spent on the HR/Payroll.
    Cheers,
    Vignesh

  • Hi, what can i use location service for find my lost macbookAir

    hi, what can i use location service for find my lost macbookAir

    If you're an iCloud user and had "Find my Mac" enabled in the System Preferences, then you can go to www.icloud.com, sign in and click Find my iPhone.

  • What should I use to scan for Trojans or Keyloggers?

    I've heard conflicting conversations about not using anti-virus or that OS X has built in protection, but I wanted to know what the best way to check for Trojans or Keyloggers is so I can give my computer a looking-over before backing it up.
    I'm using OS X 10.6.8

    Conversations?  There have been a few of those.
    I'm not aware of a tool that's particularly reliable about detecting malware, nor one that might (for instance) catch hardware keyloggers.
    The usual questions around your situation apply; I don't know how you use the system, nor what exposures or risks you might have or might face.  For instance, how sensitive is your information, who has had access, and what are the circumstances associated with the access, and what's been loaded onto the system? 
    If you're incautious or blasé about your computing practices and fond of downloading from torrents or acquiring cracked software or downloads from sketchy sites, then the anti-malwaretools generally won't save you.
    In general: just back it up, back it up regularly, and keep various copies of the backups offline or remote, or both.  Backups and caution are among the best available anti-malware tools.
    If you're fond of installing random stuff and particularly of entering your administrative password when prompted — that password is the proverbial keys to the security kingdom, to your address book, etc — or if your login passwords have been compromised (or have kids around that install all sorts of Free Stuff! and Free Games!), then change all your passwords, and install Little Snitch or equivalent, or implement and use network perimeter monitoring.  These monitoring tools catch (unexpected) outbound network connections, such as that Facebook watering hole attack.
    Better still: upgrade to 10.7 or 10.8 as your hardware permits, as 10.6 is rather old and lacking some of the newer capabilities here, such as Gatekeeper.  Disable the Java web start plug-in to disable Java (and don't install Java after you upgrade to 10.7 or 10.8), and remove Adobe Flash Player, and disable the "open safe attachments" setting.  And if you're (necessarily, or otherwise) paranoid, install Little Snitch or network perimeter monitoring.
    If you feel obligated to use a malware scanner (the hit rates on the malware-scanning tools are far from great, and the implementations of most aren't that much different from the malware itself in terms of how the scanning software can insinuate itself into the system and can sometimes then trigger issues with stability and operations), then ClamAV is the usual recommendation around the forums.  OS X Server includes that, and there are various discussions around getting ClamAV going on OS X client.
    Once your operating system software has been compromised, the usual path is a wipe and reinstall, or a wipe and install of a backup prior to the breach, followed by steps to prevent a reoccurance.  Decontamination of a system is difficult, at best.  If your hardware has been compromised, you're in deep sneakers. 
    If you want to be or need to be paranoid due to the information involved or folks that have had unfettered access to your system hardware, then check for dongles or other unexpected external devices, and start replacing your equipment. The "better grade" keyloggers can be stored in USB devices, and can be mounted within your hardware.  The better-grade gear can be difficult to locate, short of disassembly.  Also check your local network, as it's feasible to monitor traffic there, whether within a modem, or within a device added to your network.
    Again, how paranoid you wanr or need be here depends highly on what you've been up to, and who might be after you, and a whole host of other details...

  • Could we use embedded SQL for XML in .pc ?

    Hi,
    Can we use embedded SQL for XML in .pc ?
    <1> assume we have run SQL statements in Oracle9i:
    SQL>create table MY_XML_TABLE
    (Key1 NUMBER,
    Xml_Column SYS.XMLTYPE);
    SQL>insert into MY_XML_TABLE(key1, Xml_Column) values
    (1, SYS.XMLTYPE.CREATEXML
    ('<book>
    <chapter num="1">
    <text>This is the my text</text>
    </chapter>
    <book>')
    <2> Could we directly translate it in .pc as usually:
    <outlined, not exactly)
    int emp_number = 1;
    XML_Data emprec; /* ?????? */
    EXEC SQL SELECT M.Xml_Column.GETCLOBVAL() as XML_Data
    INTO :emprec INDICATOR :emprec_ind
    FROM MY_XML_TABLE M
    WHERE Key1 = :emp_number;
    Thanks
    MJ

    reply by myself.
    No problem!!
    ===============================
    int emp_number = 1;
    struct emprec{
    char feature[1280]
    EXEC SQL SELECT M.Xml_Column.GETCLOBVAL() as XML_Data
    INTO :emprec INDICATOR :emprec_ind
    FROM MY_XML_TABLE M
    WHERE Key1 = :emp_number;

  • What Resolution to use from Istock for Youtube?

    I'm trying to make my first movie which will be uploaded to Youtube. I will shoot my video in 1080. I am assuming (not always smart) that I should use the standard 4:30 aspect ratio. I want to use include some stock video footage...probably from istock. I have four options with increasing file sizes and costs. Small Web 320X180; big Web 640X360, HD720 1280X720 or HD1080 1920X1080. For use on YouTube does it make a difference? I have no clue what I should use, but obviously I would not buy the largest and most expensive. The video will basically be B-roll and I will do a voice over. Thanks for any assistance.

    This is the iOS forum, so for iPads and iPhones.
    iPad2 & iPhone4s can edit in 1080,
    iPhone 4 and iPod Touch can only edit in 720.
    There is no 4:30 ration that I have heard of.
    All HD formats are 16:9 ratio; thought there is a some odd or letter boxed cinema sizes.
    There is no 4:3 HD format.
    4:3 was a standard for early SD television, but is not an HD standard or even a format sorry.
    You tube can accept various frame sizes.
    You should start by thinking what size you want to deliver, and edit up to that frame size.
    Stock footage should be up to that size too.
    I'm wondering why you want to put B-roll on you tube? And why is there stock footage in your B-roll?
    If you want answers specifically for iMovie for Mac you should as Apple to move this question to the mac forum.

  • What is the use of services for object icon (attachment) in customer master

    Hello,
    What is the use of the icon in customer master i.e. service for object(attchment)
    Any idea In which table those attachemnts stores,
    In SAP i can see only temp. structure table SGOS_ATTA when i look for table information, so i dont know where to look for these files although i tried great selection of tables which either were empty
    Thnks,
    Ahamad S

    Please search the forum or Google with the same text so that you will find many times this has been discussed.  Please go through the forum rules which you can see to your right screen and adhere to that.  Being an old member, no need to stress this.
    G. Lakshmipathi

  • What standards are used by Microsoft for developing Windows Server and other products

    Where can I obtain or solicit information regarding Microsoft software development process compliance with national/international standards? I need to create regulatory documentation, and knowing which ISO, IEC, ANSI, etc. standards that Microsoft uses to
    develop specific applications (including but not limited to Windows Server 2012 Standard) would be most useful.
    My efforts to obtain this information (live chat, calls to different support numbers and tweeting) have been fruitless.
    Any help would be much appreciated.

    As to the 'broken' link.  The editor in the forums has a nasty habit.  If one concludes a sentence with an URL and puts a period after the URL to designate the end of the sentence, the forum editor includes the period as part of the URL. 
    Delete the period and the link will work.
    What do you mean by 'standards' for software development?  If you mean something like ISO/IEC 12207, I think you are going to have to search Microsoft web sites and then see if you can strike up a conversation with authors of articles you find. 
    I am not aware of any specific publication of conformance to such standards within Microsoft.  Even though I worked for them for 12 years in a non-engineering role, I tended to take an interest in this sort of thing based on interests developed in previous
    roles.
    Here is a link (http://www.microsoft.com/security/sdl/resources/publications.aspx) and here (http://www.microsoft.com/security/sdl/default.aspx) that
    covers their Secure Development Lifecycle.  To a great extent, Microsoft 'wrote the book' on how to do secure development (http://www.barnesandnoble.com/w/the-security-development-lifecycle-michael-howard/1110830298?ean=9780735622142). 
    It may appear dated, as it was published about eight years ago, but it became the textbook for some college courses on secure development.
    . : | : . : | : . tim

  • What driver to use with Plays for Sure Zen touch

    Hi, I've upgraded my zen touch to 2.0.05 in the past.
    Now I'm using a new computer and I need to install drivers for the Zen Touch.
    The drivers on the CD do not recognise my Zen Touch, the latest drivers only support zen touch with firmware below 2.00.00, and to my knowledge, Microsoft has discontinued the use of Plays for Sure devices.
    Further more the bundle update for Plays for Sure device only works if it can detect the Zen Touch in the first place, which it cannot.
    So does anyone have a working driver for Zen Touch firmware 2.00.00 and above, thanks.

    actually I do have the mtp drivers installed, but the interface is not as good as the Nomad Explorer. But when I try to install the real drivers for Explorer, it tells me that the Zen is undetectable, even though it clearly is plugged in and seen by the computer.

  • My iPhone 4 is 8 gigabytes, and it says I have no storage available when I have 2 apps, no songs, and 26 photos. What could be using so much space?

    I deleted everything on my phone but it still said I was using 6 gigabytes. Help, please!

    How could anyone here possibly know what is taking up space on your device?
    Look for yourself and find out.
    Settings > General > Usage
    Or connect the device to a computer running iTunes and look at the Summary tab.

  • What is i_step =1 or 2 and what is e_t_range used in Cmod for customer exit

    Hi All,
    What do we go for I_step =1 or 2. And what is e_t_range is it a table or structure ? Can anyone explain me about it.
    What happens if we use i_step = 1 and 2?
    Thanks
    Pooja

    hi Pooja,
    I_STEP = 0. This step is not called during report execution but when a report variable is used in other instances such as InfoPackages and authorizations.
    I_STEP = 1 - Called prior to processing of variable pop-up and for each u201Ccustomer exitu201D variables. Can be used to fill variable with default values. Function module EXIT_SAPLRRS0_001 is called with I_STEP = 1 in function module RRS_VAR_VALUES_EXIT_BEFORE.
    I_STEP = 2 - Called after the processing of the variable pop-up. Only for those variables that are not marked as u201Cready for inputu201D or are set to u201Cmandatory variable entryu201D. . Function module EXIT_SAPLRRS0_001 is called with I_STEP = 2 in function module RRS_VAR_VALUES_EXIT_AFTER
    I_STEP = 3 - Called after all variable processing and gets called only once and not per variable. Here you can validate the user entries. Function module EXIT_SAPLRRS0_001 is called with I_STEP = 3 in function module RRS_VAR_VALUES_EXIT_CHECK.
    E_T_RANGE: Its an Strcuture to export final values after all the calculations made in the exit.
    Let me know if you still need some more explanation.
    Regards,
    Shiva.

  • Out of interest... What do you use Cisco VPN for?

    Is it more secure than Activesync for example?
    Thanks in advance.
    (ps. We run VPN's. Just not sure what the value is for an iPhone)

    Our employees use VPN to access internal company web sites and our financial system from their iPhone. We also have network adminstrators performing support functions via remote desktop, VNC and via other connections.
    ActiveSync, when used with the SSL function enabled, is secure enough for us and we allow access outward facing to the Internet without the need for VPN (we also allow access while connected via VPN).

  • What settings to use to share for making idvd?

    I have 4 different clips, total about 40 minutes of time. I've played around with the expert settings to share, but I'm wondering if I'm making things too complicated. What is the simplest, but ok quality way to export for use in idvd?

    It's not necessary to export the iMovie project to make a iDVD.
    iMovie HD creates a small reference movie on its that iDVD uses to make a DVD. It's the file that Bengt pointed you to.
    The movie has no data of its own, just pointers to the files in the iMovie project. Without your doing anything, iMovie updates that movie each time you save the iMovie project so it's always ready to share with iDVD.
    1. Press the Create iDVD Project button in the iDVD tab of iMovie. iMovie will tell iDVD to make a new project and send it the reference movie; or
    2. Drag the iMovie HD project into the iDVD window.
    Bengt's method works too, but it's a bit more complicated than it needs to be. If you drag the iMovie HD project icon into the iDVD window, iDVD will look for reference movie Bengt pointed you to that's inside the package.
    Karl

Maybe you are looking for