What is the best product for me?

Next year I will be a college student and want an apple product that can be my notebook. I currently use OneNote on a Toshiba tablet, but want to upgrade to apple. I know that apple does not make a tablet, but I figured I could get an ipad with a stylus for when I need to write things like math. I could also get one of those attachable keyboards for essays and such. Does this sound like a logical system for a college student? Can OneNote even be downloaded on an iPad? I've seen the styluses and they seem a bit weird, with a round rubber tip. It seems as though that isn't very efficient for writing as you wouldn't know exactly where what you draw would show up, am I right about that? If I am, I guess I would just get a normal Macbook and simply use paper for math class. Please let me know what you think would be the best system for me. Thank you!

Look at these links.
http://www.cultofmac.com/185805/why-you-should-buy-an-ipad-instead-of-a-macbook- for-college-back-to-school/
http://www.forbes.com/sites/quickerbettertech/2013/06/10/whats-the-best-tool-for -college-a-macbook-or-ipad-and-wait-what-about-windows-8/
http://techland.time.com/2012/08/28/ask-techland-ipad-with-a-keyboard-or-macbook -air-for-an-adult-student/
http://www.gizmag.com/2013-macbook-air-11-inch-vs-ipad/27993/
http://www.imore.com/imore-tv-25-buy-ipad-11inch-macbook-air
http://www.pcadvisor.co.uk/buying-advice/apple/3420938/macbook-or-ipad-what-shou ld-you-get/
 Cheers, Tom

Similar Messages

  • What is the best product, for image gallery usage.. to crop, colour correct, and re-touch etc.

    what is the best product, for image gallery usage.. to crop, colour correct, and re-touch etc.

    Hi gardenzio2,
    You can try using Adobe Photoshop

  • What is the best product for keeping a mac pro running fast?

    What is the best product for keeping my mac pro running at optimal speed?

    Enough RAM. More than just so there are no pageouts.
    A fast small SSD for boot system drive that is only OS and apps and 50% free
    Backup clones of your system and data plus TimeMachine
    Avoid security suites from 3rd parties and other would be helpers (unless instructed to for a specific need and purpose).
    Replace and update older components. could be graphic card, no longer suffices wtih Lion, or causes heat and dust. And make sure that the fans cool the system properly. May need to boost the low default fan speed profile and that is one utility that can be a must. Also monitor system temp readings.
    Don't jusst idly restart after a crash or freeze, use Lion Recovery Mode and Safe Boot instead.
    Make backup clone before making updates and changes to your system.

  • What is the best product for designing logo in adobe?

    Hi there! I just need to learn logo designing. That's why I want to know that what is the best product in adobe for designing professional logo? I hope better answers for this.
    Thank you.
    Damith

    Thank you so much MichaelKazlow Many of people says. Illustrator is best. But some people interested to CorelDraw. What is the deferent between both of this?

  • What is the best product for using itunes only?

    I am considering buying a laptop / notebook / ipad or whatever for using itunes only.  The goal would be to add all cd's to the product and then increase my collection via downloads only going forward.
    Can anyone recommend the best product for this please?  I have an ipod nano and I'm new to the iphone, so I'm an Apple convert, although I'd consider a non-Apple product too (sorry Apple!).
    Budget is tight!
    Thanks in advance
    Rufus73

    Without a bit more info, it's hard to answer your question.
    How many CD's do you intend to keep on the PC/Mac/iPad as an iPad has a maximum storage of aprox 55Gb's for the top model, whereas even a basic PC laptop is likely to have 150Gb plus of space. Plus you are going to need a PC/Mac to copy the CD's in the first place, unless you intend to buy all your music from the iTunes store.
    For me I would look at either a MacBook if you can go to the £1000 price bracket, or look at a MacMini and cheap screen then transfer the music to your iPod/iPhone or sadly from a price point of view you may have to go the Windows route as a basic laptop will start at £400
    Mike

  • What is the best product for network mapping and monitoring? I am an inexperienced user). Mac 10.9.2 laptop

    I have lots of questions, but the gist is that I want to know the best product, preferably from the app store, that I can use for network mapping mapping and monitoring.
    I want to get their mac address or other police trackable etc info so I can use my computer safely.
    I am also being cyberbullied.
    I try just using ethernet but still get intruded on, for instance, messages that "other devices are using my ip address". The only other device I own is an iPod that I keep sahut off plus wifi turned off then.
    (NOTE:  You can skip the rest of this message if you want. It regards hacking attempts etc,  a little out of the scope of discussion, perhaps).
    Also a home intrusion where computer was thoroughly hacked with router(s) set up "very very close to me," according to Apple.
    Also, hackers get into my Facebook and gmail and yahoo mail, really,  no matter what I try to do on my computer and how many times I change passwords it does no good.
    Also,  The ip addresses for google and the one in syste preferences and the one looking up my ip address on ip chicken always gets three different results.
    More worrisome it that hackers got into my Wells Fargo account a week after the intrusion even though I changed all account #'s and pw plus notified bank. They also broke into paypal using my new account numbers.
    Also, stuff like Facetime pops up on my computer without my clicking on it even though I'm using ethernet to connect. I've given up on Time Capsule because I'm told that's how the hackers hacked my computer so thoroughly duriung the intrusion.
    Thanks.

    Aubry,
    why don't you send your sequences straight to Compressor first, encode your movies as MPEG 2 and AC3 audio and import all assets in DVD studio PRO?
    G.

  • What is the best product for converting MTS files (NOT on camera or in root directory) for editing in Final Cut

    Hello all,
    I have read the forums and know that I cannot use the Log and Transfer function on Final Cut Express 4.0 for my AVCHD files (from my Panasonic HC-V700) AFTER I have transfered the files out of the original root directory.  Unfortunately, I did not know this until recently and I have a bunch of old footage in .mts form that I copied onto my harddrive WITHOUT the root directory.  I now must get it into Final Cut Express 4.0.1. and I would like to use a Log and Transfer style program so that I can select what I need and erase the rest.  I know about the program VoltaicHD which can be used for this purpose.  I have not yet purchased it, but I will if this is my best option.  The downsides to it are that it takes a lot of time to process the files (i hear from this forum) and that it creates extremely large files (hearsay from this forum, though I would like to know just how big those files are and how they compare to the size of files final cut creates). When I tried the trial version, I also noticed that unlike the log and transfer function in Final Cut Express 4.0.1, you cannot capture multiple subclips from a single clip.  Well you can, but you have to load the clip into the viewing window again, which is not ideal.
    I would love some more advice on this.  I imagine other people have made this same mistake and have had to figure their way out of it.
    I was also wondering is it possible to use Final Cut Express's Log and Transfer program directly from files if they are in a different file format.  So far my experiments with this have failed.  But if this is possible, I suppose I can also just convert all the backlogged files wholesale into a format that Final Cut Express supports more easily for Log and Transfer (What file format would this be? Sorry I am new to this).  My new harddrive has a lot of free space, so I could probably handle the huge amount of storage that this would require for the raw footage and then I could erase it after I log and transfer just what I need.   In which case, do folks have recommendations for a file convertor.  I am dealing with over hundreds of files and I don't think the free online convertors would work. This product has been suggested to me, but I know very little about it.
    Thanks!
    Mira

    I am also finding, when I use Voltaic trial version, that the quicktime movies it creates are of inferior quality than those created through log and transfer into final cut express and imovie, particularly during rapid movement. There's a lot of visible lines running horizontally around areas of rapid movement (not sure what the lingo is for this).
    Anyway, now I am getting accustomed to the idea that my best bet is probably just a high quality converter to get my mts files into something more useable by final cut.  At this point, I am willing to sit through the render time that it will take on final cut express while I edit.  I am just trying to get my footage into workable format without losing quality.
    Thank you!
    Mira

  • What is the best product for my needs ?

    I am getting confused with what product i should use ?
    What we have is web big scale application (lots of concurrent users), while it's web tier is written in ASP.
    I need the ability to preview reports, does RDC is the right answer for me and if it is Crystal Reports XI Developer Edition is the best version?

    I would recommend moving away from the RDC period. This is an old technology and has been retired in the currently shipping version of CR (CR 2008). Moving forward, consider either the .NET or Java SDKs. As to what will be best for your requirements regarding loads, users, etc., see this:
    Choose the right SDK (ppt)
    https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/40bccdfd-88a6-2b10-1da1-c47a54b625a7
    Choosing the Right Business Objects SDK for Your Needs (article)
    https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/7025839b-00d4-2b10-33b4-cf0aa9e08412
    Optimizing Reports for the Web (article)
    https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/701c069c-271f-2b10-c780-dacbd90b2dd8
    Crystal Reports 2008 Component Engine Scalability (article)
    https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/7025839b-00d4-2b10-33b4-cf0aa9e08412
    Ludek

  • What is the best product for interior designers?

    Have not purchased a Photoshop product yet. Which one is best for interior designers? Tx

    Or maybe look at one of those 3D packages.  It's a competitive world, and impressing the client with a virtual walk-through of the revamped environment might be the difference between you, and someone else getting the work. 
    Home Styler comes from the same people who make Autocad, which is as good a recommendation as you can get.  I know nothing about it, but it says it's free!
    http://usa.autodesk.com/homestyler/
    But from an Adobe products point of view.  Photoshop for sure IMHO.  You can use it in a similar way to an airbrush artists adding shading and textures, and light and shadow. 
    Something else I'd definitely think about, is an Interior Design forum.  Flickr has thousands of such groups (it calls them Pools now), and you can ask the people already doing the same thing
    http://www.flickr.com/groups/interior/

  • What is the best product for music and gaming? I'm looking for an apple COMPUTER. Not iPod etc.

    Hi! I am looking for an apple computer that would be good for gaming and music, movies etc. So I would like some input on some different products I'd be able to buy? The types of games I play are downloaded also. Any help would be good! Thank YOU!
    P.S
        I'm looking for preferably a laptop.

    while the Air can play many games fine, it is not an idealized gaming machine.
    examine a macbook Pro model at your local Apple store for evaluation if you plan on much gaming.

  • What is the best product for creating/redesigning employee benefit guides (with a epub function)?

    I am looking at InDesign CS6... your thoughts?

    I think tables will be more of an issue/concern than what version of Indesign you use.
    Here is a link to EPUB Assessibility with tables, notice the first sentence "When tables are not structured accessibly, the data they contain can quickly become a meaningless sea of numbers..."
    I am not suggesting this cannot be accomplished, however it may require a lot structing, formatting, modifying and testing.

  • Acrobat Standard XI, but can only find the CD for windows.  I have a mac (I have access to an external CD drive and I have the product keys for windows).  What is the best way for me to install it?

    Hi, I purchased Acrobat Standard XI, but can only find the CD for windows.  I have a mac (I have access to an external CD drive and I have the product keys for windows).  I have never installed it anywhere else.  What is the best way for me to install it?

    Hi lintonm86921521,
    I can understand your concern & will guide you through this.
    I am so sorry to inform you that Acrobat XI Standard is not available on Mac, you can only use it on your Windows computer.
    You can also refer to the system requirements at : System requirements | Acrobat family of products—older versions (XI, X, 9)
    In case if you have any further query please let us know, we will be happy to help you.
    Regards,
    Aadesh

  • What's the best photograph for a no background image?

    I am about to photograph some products and would like to make a set up where I can photograph each of the products in the same setting/lighting. Then, when I go to open/edit them in PhotoshopCS4, I can take out the background and have just the image. Then, I can place that image ontop of any background I want. There is one bad thing. Some of these have a clear top where you can see thru them. Does or will that make a difference?
    I want to set it up like they do for the weather on television, have a blue background and erase all of the blue showing. Then the only thing showing in the end is the digital background that was added in by computer and the weatherman(unless he's wearing a blue tie, in which case you can see the info through him). But my question still stands, what is the best setting for this and/or background color, how should the photographs be taken and then opened and edited(removing the background) using PhotoshopCS4?
    We have a lighting set up, a 30" x 30" x 30" light tent setup, 3 lights with Pro Light Reflectors(one on the left, one on the right and one on top), 1 white and 1 black background and a box to place the images on. I'm using a Nikon D100.
    Attached in a photo example.
    This was taken with the black background and you can see the black through the bottle. I erased all of the surrounding black, but the dark shades still show on the sides.
    Any help will be appreciated.
    Sean

    The whole point is that these photographs will be used for the book, manuals, magazines, ads... The backgrounds will not always be the same.  That's my main problem. I am trying to figure out a way for the glass of the bottles to be "glass" images or "see through" so that when the photograph is placed on a background of, let's say, flowers, the flowers would show through. The edges of the glass are still solid and the flowers would not show thru them, but...
    Is this type of thing possible for printing quality photographs?
    Note - In the attched photo, it can be seen that the black background can be seen the plastic cap.

  • What is the Best practice for ceramic industry?

    Dear All;
    i would like to ask two questions:
    1- which manufacturing category (process or discrete) fit ceramic industry?
    2- what is the Best practice for ceramic industry?
    please note from the below link
    [https://websmp103.sap-ag.de/~form/sapnet?_FRAME=CONTAINER&_OBJECT=011000358700000409682008E ]
    i recognized that ceramic industry is under category called building material which in turn under mill product and mining
    but there is no best practices for building material or even mill product and only fabricated meta and mining best practices is available.
    thanks in advance

    Hi,
    I understand that you refer to production of ceramic tiles. The solution for PP was process, with these setps: raw materials preparation (glazes and frits), dry pressing (I don't know extrusion process), glazing, firing (single fire), sorting and packing. In Spain, usually are All-in-one solutions (R/3 o ECC solutions). Perhaps the production of decors have fast firing and additional processes.
    In my opinion, the curiosity is in batch determination in SD, that you must determine in sales order because builders want that the order will be homogeneus in tone and caliber, and he/she can split the order in diferents deliveries. You must think that batch is tone (diferents colours in firing and so on) and in caliber.
    I hope this helps you
    Regards,
    Eduardo

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for