What's the maximum RAM my Macbook Pro can support?

According to Apple's website, my Mac (MacBook Pro, 13-inch, late 2011) can support up to 8 GB of RAM (two cards of 4 GB each) as a max.
Yet, in other websites (like Kingston's) and questions in Apple's Support Communities site itself I've seen that it can support up to 16 GB.
I'd really like to know if I can upgrade up to 16 GB so I don't make any useless waste.
Thanks in advance for your answers.

16 GB

Similar Messages

  • What is the maximum memory for Macbook Pro 8,1?

    The Crucial site recommends 2x8GB, but "MacTracker" says that although you can install 16GB, the computer will only access 8GB. Which is it?

    It is:
    Maximum Memory
    16 GB (Actual) 8 GB (Apple)
    Memory Slots
    2 - 204-pin PC-10600 (1333 MHz) DDR3 SO-DIMM
    MacTracker makes no such statement.

  • MAXIMUM RAM for MacBook Pro Core 2 Duo Mid 2010

    What is the MAXIMUM RAM for MacBook Pro, 2.4 GHz Intel Core 2 Duo, Mid 2010 - 24MC374LL/A, running OS X 10.8.2 (12C60)?
    I tried to search for this but was unable to find anything.
    Apple Specs say 8GB, but I was just told by someone I THINK would know, that you can actually go up to 16GB.
    This would be an enormous improvement to my workflow if true.
    Anyone out there know for certain?
    Making sure before I buy (or NOT!)
    Thanks.
    Jerry G

    I just found this post and I realize this is a late response but maybe it will help others.
    Based on recent circumstances I just happened to have two 8GB DDR3 modules collecting dust. Having an old trusty MacMini as my media center, server among other things and whatnot, I was curious if I could bump this little thing to 16GB. In doing so I found this post and verified with OWC.
    End result:
    Booted with no issues, and is running nice and smooth. Should be noted that just adding 16GB of RAM to a Core 2 Duo will not make the machine lightning fast or become some amazing computing platform. It will just make the box run a bit quicker and give you the ability to have more applications open before you begin to note some lag.
    However this is really nice to see:

  • I want to upgrade my macbook pro 15-inch i7 2.3GHz memory and I want to know what is the maximum RAM it could take

    I want to upgrade my macbook pro 15-inch i7 2.3GHz memory and I want to know what is the maximum RAM it could take

    Welcome to Apple Support Communities
    It looks like you have got an Early 2011 or newer MacBook Pro, so you can use 16 GB of RAM. You can buy more RAM at OWC or Crucial. Remember that you cannot upgrade RAM in MacBooks Pro with Retina display
    In case you have got a Mid 2010 MacBook Pro, you can only install 8 GB of RAM

  • What's the power Adapter for Macbook pro 13inch Mid 2012

    What's the power Adapter for Macbook pro 13inch Mid 2012 with core i-7, 2.9ghz, 8Gb ram?
    AFAIK it should be a 60wat Megasafe power adapter.
    But mine shipped with a 45Watt Megasafe. I got it as a Gift from my friend.
    Thanks in Advance.

    mmaumio wrote:
    60W MagSafe power adapter with "L" style connector
    This should be my Adapter right?
    Yes.
    There is a drawback in addition to taking a longer time to charge up your MBP.  In unusual instances when using your MBP with power adapter attached, and running a very heavy load on the CPU/GPU, the MBP will require additional electrical resources in addition to what the power adapter can provide.  It will then draw upon the battery.  What this means is that using a 45 watt adapter, these conditions are more likely to occur.
    Using a 45 watt adapter should not harm your MBP as such.
    Ciao.

  • What is the best stylus for macbook pro?

    What is the best stylus for macbook pro?

    I dont understand? Why would a mac use a stylus when they aren't touchscreen?

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What's the maximum ram for G4 1Ghz?

    Can someone please tell me what's the maximum ram I can install in my PowerBook G4.  It currently has 1 Gb Ram.
    Thank you.

    See:
    http://download.info.apple.com/Apple_Support_Area/Manuals/specs/powerbook/L24362 A_EN.pdf
    Processor and memory
    • 867MHz or 1GHz PowerPC G4 processor with Velocity Engine
    • 1MB DDR SRAM level 3 cache • 133MHz system bus • 256MB or 512MB of PC133 SDRAM; two SO-DIMM
    slots support up to 1GB
    Message was edited by: kennethfromtoronto

  • What's the maximum RAM for this notebook (C742EM)

    What is the maximum RAM size for this notebook?

    Hi,
    The following link shows its specs and max size is 2Gb
       http://h10025.www1.hp.com/ewfrf/wc/document?docname=c01179737&tmp_task=prodinfoCategory&cc=us&dlc=en...
    Regards.
    BH
    **Click the KUDOS thumb up on the left to say 'Thanks'**
    Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.

  • What is the maximum RAM for 2.16 GHz 24 in DDR2 iMac Early 2006

    What is the maximum RAM that I can install on iMac 24 in 2.16 GHz DDR2 Early 2006 model?

    Is this your Mac:
    http://www.everymac.com/systems/apple/imac/stats/imac-core-2-duo-2.16-24-inch-sp ecs.html
    I had the same model: officially it'll support 3 GB RAM; some people added 4 GB and it ran fine, but it will only address about 3.2 GB. I decided that wasn't worth it and made do with 3 GB.

  • What's the price for a MacBook Pro Retina Display Top Case with battery in the US?

    I'd like to know what´s the price for a MacBook Pro Retina Display Top Case with battery in the US.

    Here you go.

  • What is the return policy for macbook pro in china?

    I live in SuZhou, Jiangsu in China. What is the return policy for macbook pro in china? It's been 1 month and I got a main board exchange(repair).

    You would need to return it to the Apple Online Store where you purchased it and it would have to be within 14 days. They may limit you to exchange only or charge a restocking fee.
    Contact the Apple Online Store to make arrangements.

  • HT1338 what is the latest version of macbook pro?

    what is the latest version of macbook pro?thank you

    http://store.apple.com/us/browse/home/shop_mac/family/macbook_pro

  • In my ALV o/p what is the maximum length of column, I can display ( because

    In my ALV o/p what is the maximum length of column, I can display ( because the length of the text some times exceeding 600 chars ) ?
    Thanks in ADVANCE

    I have declared like
    <b>  S_LAYOUT-MAX_LINESIZE = 1000.
      S_LAYOUT-COLWIDTH_OPTIMIZE = 'X'.</b>
    However ALV output not displaying the entire length.
    Call the following function to display output in ALV form
      CALL FUNCTION 'REUSE_ALV_GRID_DISPLAY'
           EXPORTING
                I_CALLBACK_PROGRAM = 'ZFRSBOI0'
                IS_LAYOUT          = S_LAYOUT
                IT_FIELDCAT        = FIELDCAT
                IT_EVENTS          = P_EVENTS[]
               it_sort            = p_it_sort[]
                I_SAVE             = 'A'
           TABLES
                T_OUTTAB           = PDET_OTAB_ALV1
           EXCEPTIONS
                PROGRAM_ERROR      = 1
                OTHERS             = 2.
    If the function call is not successful, raise error message
    and come out from the program
      IF SY-SUBRC <> 0.
        MESSAGE E000(00) WITH
                          'Unable to display report'(E01).
        EXIT.
      ENDIF.

  • What's the maximum size a varchar2  variable can hold for and NDS Stmnt?

    What's the maximum size a varchar2 variable can hold for and NDS Statement? I read that NDS is good for doing EXECUTE IMMEDIATE on statements that aren't too big. The 10g PL/SQL manual recommends using DBMS_SQL for statements that are too large, but it never gave a limit for what too large was. Does anyone know offhand?

    The limit is the same as the length of varchar2 variable within PL/SQL - that is varchar2(32767).It's not documented, but intermediate concatenation result can hold up to (64k-1) :
    Connected to:
    Oracle9i Enterprise Edition Release 9.2.0.8.0 - Production
    declare
      part1 varchar2(32767) := rpad('begin null;', 32767);
      part2 varchar2(32767) := lpad('end;',        32767);
    begin
      dbms_output.put_line(length(part1 || ' ' || /*' ' ||*/ part2));
      execute immediate part1 || ' ' || part2;
    end;
    65535
    PL/SQL procedure successfully completed.

Maybe you are looking for

  • Ethtool bug or driver bug or faulty built-in NIC ?

    First the hardware particulars - - The laptop in question is an Acer Aspire 5050 with an AMD x86-64 Turion cpu - There is an on-board SATA chip (unused), which throws up some very odd errors but except on slackware distros, seems to do no harm. {It c

  • Problems quitting PS CS4

    I have no problems at all running Photoshop CS 4. However, I receive several messages after quitting PS CS4. When I select file - quit PS shuts down fine. However, a few minutes later I receive a popup message stating Photoshop quit unexpectedly. I r

  • Lumia 925 rebooted after cyan update (everything i...

    Hi all, I installed Cyan update less than a week ago (Finland). Everything worked fine, but today my Lumia 925 started to install by itself software updates after which it erased ALL information (pictures, personal software. addressbook  etc) from th

  • Output text in table form

    Hi all, I have a short little applescript that does some math and then outputs a mix of the results and plain text in tabular form, and copies it into a Word document. (I'm a complete novice at AS, this is maybe my third script). At present, the scri

  • WBSE Closing Error

    Hi, I have a WBSE which is open since year 2006. for all years we got some actuals and settled to AUC then we run final settlement, now auc is 0 and WBSE balence shows 0 after settlement.we have checked CJI3 report- all year balences are 0. now when