Windows user migrating, need config advice

I'm a Windows user and making the switch.  (I already have a Macbook Air, so I'm not entirely green.)  I'm replacing a fairly powerful Windows machine and I'm trying to configure a Mac Pro that's relatively high powered.  I got about 5 yeaers out of the Windows machine and expect the same this time around.  Aside from standard office functions, my biggest use is Photoshop.  I'm really just looking for some feedback on the configuration and to see if I'm making any short sighted decisions or bad trade-offs.
I think I've settled on a 2 processor, 2.4Ghz model (8 cores) with 12Gb of memory.  I'm thinking a 512GB solid state primary system drive and (2) 2TB hard drives.  I can't use the Apple RAID controller if the array contains a solid state drive, so I won't do any mirroring or striping.  I really like the Apple 27" monitor, and I'm headed toward the Radeon 5870.  I have a couple of other monitors from my Windows machine so I think I'll hang one of them off of the DVI port and one off of a Mac display port with an adapter.  I'll end up with 3 monitors, with the "main" monitor the Apple monitor and the lesser quality units on either side.
Is it worth a processor upgrade?  While my primary use is photo editing, I'm not a professional photographer and won't be editing photos 8 hours a day.  How about the graphics card?  Is it worth the extra $$$ for the 5870?
Would welcome feedback or suggestions.

The big payback is in establishing a Boot Drive. Having the Boot Drive on a fast Hard drive is an incremental improvement, and on an SSD is an additional incremental improvement -- not a major improvement, just a little bit better. I agree that it may not be worth the cost.
I can't use the Apple RAID controller if the array contains a solid state drive, so I won't do any mirroring or striping.
Disk Utility will Mirror or Stripe or JBOD without the needless complexity and excessive cost of the Apple RAID card. The Hatter swears by SoftRAID software,  US$129 for these tasks, and raves about its ability to recover and to probe for defects.
In 64-bit mode, you can address over 4GB RAM for a single Applications, which can almost completely eliminate the need to consider "Scratch drive" -- provided you add lots of Error-Correction Code (ECC)  RAM.
For best performance, each of System, Source, and Destination should have its own drive or RAID. Sharing a RAID between Source and Destination kills its peak performance.

Similar Messages

  • Windows users doesn't work after migrating from old to new server!

    We have done a complete re-install on our XServe with OD. We have about 10 Windows users, and after the installation all their settings and mail are gone. All the "normal" files are there though.
    I'm not sure we have done it the right way though: We did a backup from the old server (a bootable copy with Super Duper), then we formatted and installed everything. We made new accounts (with different names if that's good to know) and copied the users home folders to the new location. The Mac clients seem to work good, but all the settings on the Windows clients are gone...
    Is there an easier way to this? We still have the workable copy from the old installation. There seems to be some kind of export/import way to do this, but I haven't got a clue how to do that...
    Please help!

    davidh,
    We didn't reintegrate smb.conf, but set the new server up just like the old one. We did however compare these files to see that the vital parts (netlogon, shares and so on, and of course basic settings) were correct.
    We also copied the user files and profiles and made them identical on the new server, except for placing them under the new usernames.
    Regarding the Local Settings folder, it doesn't exist on the old server, that's one of the weird things. We've checked the profile for a user on the client machine, and it is a roaming profile. That's why we're a bit puzzled as to why the login works and all files are there, but the user preferences and Outlook doesn't work.
    I know I've read somewhere that the Local Settings aren't replicated like the other files in a roaming profile, but I haven't finished checking up on that. I wouldn't expect anything else than that Windows takes care of Outlook e-mail for a roaming profile as well though; I mean, the user must be able to read his/her mail from any computer in the domain, what else would the purpose of a roaming profile be?
    Except for the weird thing about us not being able to find the user preferences or Outlook files for the client amongst the files on the server, I feel we're missing something; Apparently Windows isn't as straight forward as one would expect (not sure why I did expect anything, come to think of it).
    We're going to give it a new go next weekend. Except for doing further research we're thinking of copying /etc/smb.conf and the files in /var/samba and /var/db/samba to the new server, along with exporting and importing the old user accounts to the new server, and then see if everything works as expected.
    If so, we'll see if we can change the account names in a nice way, it's really desired to do so.
    If not, we really need to do some more research, but if I'm not mistaking, the Samba-related files I just mentioned are the ones that pretty much make up the Windows Services in OS X, isn't that so?
    Thanks!

  • Windows user needs help connecting PS2

    Please, I'm begging for some help. Here's my situation:
    I'm a windows user (I know, I'm sorry). My set-up is this. I have a DSL modem connected to a D-LINK DI-614+ wireless router. I have a laptop running Windows XP. I bought an Airport Express for two reasons:
    My office is where my wireless router is connected. My PS2 is in the living room, along with my stereo. I want be able to BOTH stream music from iTunes to my stereo, AND use the Airport Express to connect my PS2 to the internet. I hate having to run a 100 ft. ethernet cable across the house to get online.
    How do I set this up?
    Thanks,
    Rob

    Sorry... but you can't do this.
    The ethernet port on the Airport Express is only active when the Airport Express is configured as a remote base station in a wireless distribution system (WDS). Problem is, your D-Link wireless router does not support Apple's implementation of a WDS. You must use your Airport Express in wireless client mode with your D-Link wireless router - a mode in which Airtunes may be streamed to the Airport Express, but the Airport Express ethernet port is inactive.
    You will need to use different method of connecting your PS2 to your wireless network. Linksys, D-Link, and Netgear all sell "wireless game adapters" designed specifically for this purpose.

  • Execute Teststand as windows-user: which files needed for write-access

    Hello,
    which files/directories do i have to set for write access?
    Normally windows-administrator can access everything.
    But a windows-user has for example no write-acces to teststand\Cfg.
    So sometimes i get the error-message that a file is write protected.
    Is this somewhere explained in the TS-documentation that also a windows-user need write-access? I have this question from a client and i am not sure how exactly it is.
    Thx for info
    Message Edited by OnlyOne on 07-10-2009 05:36 AM

    Hi OnlyOne,
    With TestStand 4.1 and later, we changed the directories for the TestStand Cfg folder and the TestStand Public folder (formerly called the TestStand Users Directory). These changes allow a normal Windows-User to write to the TestStand Cfg and Public folders without having to specifically grant write permissions.
    Manooch H.
    National Instruments

  • Migrating ppc xserve to intel xserve - windows users

    I have a PPC xserve that acts as our DNS, OD master, mail and Windows Server.
    I have 30 windows users that access this system.
    We have a new Intel Xserve and I intend migrating from the PPC system and retiring, reassigning the PPC m/c.
    From what I understand the simplest way to achieve this is to set the Intel server up as required with DNS and OD settings from scratch.
    Then bring over the OD archive from the PPC.
    I can then add the (PPC) saved plists for mail etc.
    Move all the required data and set up shares.
    This all seems OK, what I want to know is if anyone has any experience with the windows users once this has been done.
    Do they have to be rejoined to the "windows" domain, will I have to make copies of all their local profiles, in case the profiles get trounced.
    Any experiences would be appreciated, as usual the less work per m/c the better.

    I did a little research on the boards here and it
    seems the method of choice to move a mail server is
    to use the trusty mailbfr. I am curious if anyone has
    used this method to move a ppc mail to an intel
    mail?
    I suppose the core components of the OS are the same
    so my gut tells me this should work fine. Anyone know
    differently?
    Thanks,
    JL
    Yes, worked fine for me.

  • Lenovo Yoga 2 13, Kali Linux 1.0.7, Ubuntu 14.04, Windows 8.1 install, config, and wifi fix.

    Lenovo Yoga 2 13, Kali Linux 1.0.7, Ubuntu 14.04, Windows 8.1 install, config, and wifi fix.
    I wanted to share an experience with everyone I hope will help others avoid what I have gone through the past 3 days. I bought a Yoga 11s that I loved but had some issues with the wireless, Lenovo being awesome replaced it with a Yoga 2 13. I love this laptop but ran into some issues with Linux install/wireless, which I wanted to show how to resolve in one place. Hopefully this will help someone else get through this quicker
    I am going to try and write this for someone with little Linux experience, if I miss the mark please let me know and I will clarify the best I can.
    For work I need Windows 8.1 and Kali Linux, while for home I prefer Ubuntu.
    My Yoga 2 13:
    I5 1.6 ghz
    8 GB ram
    256 GB SSD
    ORANGE!
    My requirements: 
    I need Windows
    I need Kali Linux (livecd, even with persistent mode was not an option as it would not save the wireless fix or system updates) – I would also like this on a USB drive and not the internal SSD
    I would like Ubuntu
    Needed to do this:
    1. 2 USB thumb drives (at least 8gb in size each) I used 2 Leef Supra 32GB drives. They are my favorite right now and are only about $27 at amazon.
    2. Phone that can USB Tether or a USB Ethernet card (External USB wireless will show as "Hardware Locked"). Again you can pick one up for sub $10 if you need the USB Ethernet route. I used my Galaxy S5, you will need to download 200-300 mb of items through this so make sure you have the data if you go that route.
    3. You may be able to get a USB wifi card to work if you do the following after boot. This only worked once for me.
                    a.Type ‘sudo rmmod iwlmvm’
    b.Type ‘sudo rmmod iwlwifi’
    4. ISOs of Ubuntu and Kali Linux (I used Ubuntu 14.04 and Kali Linux 1.0.7)
    5. Software to unzip the ISOs. I recommend 7-ZIP and will be referencing this in this guide.
    6. I will include the EFI boot files and the WiFi fix files if I can attach. Otherwise I will provide a link to them.
       Link: https://www.dropbox.com/s/puxnnoft3gn2b6l/WiFiFix.zip
    Recommended (these are just in case you corrupt something making your system not see any OS
    1.  I would call Lenovo beforehand and get a set of recover disks (this will take 2-3 days)
    2. In the meantime a USB Windows 8.1 or 8 ISO (the repair feature may save you)
    *Note: At many points in this guide I detail steps and commands. Please double check that you understand the step before proceeding. There are multiple points where a mistyped command or clicking the wrong option will cause your entire system to fail and you will need to reformat the entire drive and start over. This also will make One Touch recovery not work. Proceed with caution.*
    I did not need to disable ‘secure boot’ to do this, but keep in mind that you may need to.
    Steps:
    First let’s go through the installs, and then we will go through grub config and wireless fix
    1. In Windows scroll to computer and right click, select manage.
    2. Go to “Disk Management”
    3. Select the main HDD (notice Lenovo puts a stupid number of partitions on here)
    a. I deleted the D: drive on here, if you do this make sure to copy the drives over to your main C: drive. You will want to run each of the installers and repair the drivers after.
    4. I used the space from the D: drive and pulled a little more creating a 50 GB partition for Ubuntu and my swap file
    a. You can also add more space by right clicking your C drive and selecting shrink
    b. Do not format the partitioned data as this will make identifying it later much easier.
    5. Open a command line
                    a. Swipe from the right of the screen and select search
                    b. Type ‘cmd’
                    c. right click and select ‘run as admin’
    6. For Ubuntu: Type ‘diskpart’ into the command line
                    a. type ‘list disk’
    i. You should see 2-3 disks depending on if you have one or both usb drives in the laptop at the time. I would suggest only doing 1 at a time so you don’t lose track.
                    b. type ‘select disk $’ (Replace the $ with the number of the drive)
    c. ***** Before proceeding make sure you have the correct drive selected or you can ruin your Windows install and Lenovo one touch recovery will not fix it since we have changed the partitions *****
    d. type ‘clean’
    e. type ‘create partition primary’
    f. type ‘active’
    g. type ‘format  fs=fat32 quick’
    h. type ‘assign’
    i. type ‘exit’
    6. For Kali Linux: Type ‘diskpart’ into the command line
                    a. type ‘list disk’
    i. You should see 2-3 disks depending on if you have one or both usb drives in the laptop at the time. I would suggest only doing 1 at a time so you don’t lose track.
                    b. type ‘select disk $’ (Replace the $ with the number of the drive)
    c. ***** Before proceeding make sure you have the correct drive selected or you can ruin your Windows install and Lenovo one touch recovery will not fix it since we have changed the partitions *****
    d. type ‘clean’
    e. type ‘create partition primary size= 3272
    f. type ‘active’
    g. type ‘format  fs=fat32 quick’
    h. type ‘assign’
    i. type ‘exit’
    j. By doing this we can maintain a portion of this drive as the install CD and still have linux install/ liveCD if we need to run it on another machine.
    7. At this point the drive is ready to have the contents of the ISO copied over.
    8. Right click the ISO and select 7-zip then ‘zip to /’ This should unzip the ISO to the location of the ISO into a folder named exactly the same as the ISO.
    9. Once this is done for Ubuntu ISO it is done
    10. Kali requires a little bit more to be ready
                    a. Kali will need some files added for EFI boot. --$--
                                   i. Thanks to: https://forums.kali.org/showthread.php?271-How-to-EFI-install-Kali-Linux
                                   ii. EFI files are located within the wifi fix folder https://www.dropbox.com/s/puxnnoft3gn2b6l/WiFiFix.zip
    11. Now let’s start with Ubuntu
    Ubuntu install
    1.     Place USB drive into the laptop and press the “Lenovo boot” button next to the power button
    2.     Select ‘Boot Menu’
    3.     Select ‘EFI USB Device (Name of drive)’ Mine stated Leef Supra
    4.     Select ‘install Ubuntu’
    5.     Go through the Ubuntu install until you get to select the install drive
    6.     Once you get to the install portion it will ask you to select from one of 4 options. Select ‘Manually select partition’
    7.     Select the “Free Space” where we opened up some of the drive
    8.     You will need to create 2 partitions, I usually create the swap partition at the end of the drive
    a.     First I create the swap
                                              i.    Set at the end of the drive
                                             ii.    Set size to 1024 mb
                                            iii.    Set type to ‘swap’
    b.     Second create the ext 4 partition
                                              i.    Set to beginning of drive
                                             ii.    Set to remainder of the space
                                            iii.    Set type to ext4
                                            iv.    Set mount point to /
    9.     Finish the install and boot into Ubuntu
    10.   You will notice that your wireless is ‘disabled by hardware’ This is fine for the time being and we will worry about this after the kali install. If we fix it now for some reason after installing kali we get the error again and would just need to fix it again.
    Kali Linux install
    1.     Place USB drive into the laptop and press the “Lenovo boot” button next to the power button
    2.     Select ‘Boot Menu’
    3.     Select ‘EFI USB Device (Name of drive)’ Mine stated Leef Supra
    4.     From the grub menu select ‘install kali linux’ both graphical and text work. I much prefer text install
    5.     You will get a few errors through the install but that is fine
    6.     The first we see is about network hardware and ‘load missing firmware from removable media?’ – Select ‘no’
    7.     Then select no ethernet card
    8.     It will have you name your machine then it will ask you for the root password
    a.     If you want to just use root *not recommended* place the password here
    b.     If you wish to use a non-root account then leave these blank and it will ask you for a name, username, and password of the new machine *Very Recommended* - this will also add this user to the sudoers file
    9.     It will then ask you to ‘partition disks’
    10.   Select manual
    11.   Now here is where it can get a little confusing so read twice click once
    12.   Select the USB drive from this list
    13.   Mine shows up under (sdb) – Leef Supra
    a.     It could be sdc, sdd, sde, etc… depending on how many drives you have plugged in.
    14.   You should see one primary drive that is 3gb or so that is formatted as FAT32. – DO NOT TOUCH THIS PARTITION!
    15.   You should see the remainder of this drive as ‘FREE SPACE’ select that
    16.   Create a partition at the end at size 1024mb and swap
    17.   Then create another one for the remainder of the drive and set it to ext4 with mountpoint of /
    18.   Continue through the install after you should see an error warning you that ‘you may not be able to boot’ that is fine, select continue
    19.   Then select from the menu of all the options ‘continue without bootloader’
    20.   It should finish up then reboot on its own.

    First setup/boot/fix grub
    1.     You should  be able to boot up into GRUB2 menu now.
    2.     You may not see kali linux in this menu (make sure you have your towel and don’t panic!)
    3.     Boot into Ubuntu
    4.     Once you log in you should see that you still cannot use wireless due to being locked by hardware
    5.     This is expected
    6.     Let’s fix grub then we will come back to fixing wireless
    7.     Plug in your device to connect to the internet (USB Tethering or USB Ethernet)
    8.     Once you verify that you now have an internet connection run the following from terminal
    a.     ‘sudo add-apt-repository ppa:danielrichter2007/grub-customizer’
    b.     ‘sudo apt-get update’
    c.     ‘sudo apt-get install grub-customizer’
    9.     You can also edit the grub.cfg manually if you know what you are doing… I did not
    10.   Open grub  customizer
    11.   It should auto populate and you should see ‘debian (kali linux)’ somewhere in the list
    12.   It should be mounted to /dev/sdb2 or /dev/sdc2 depending on how many devices you have
    13.   At this point go ahead and save
    14.   Reboot and test that you can get into each OS
    15.   This is where my inexperience got me. I spent 2 of my days so I am including this error: If when you boot into Kali you get an error somewhere that says ‘/bin/sh: can’t access tty: job control turned off’ look above it for an error that looks similar to ‘ALERT! /dev/sdc2 does not exist. Dropping to a shell!!’
    a.     That error is due to the mount point being incorrect in grub, reboot and from within grub highlight the kali boot. Press ‘e’ then towards the bottom you should see ‘root=/dev/sdc2’ change this to ‘root=/dev/sdb2’ again the number doesn’t matter just make sure it stays the same.
    b.     Press F10
    c.     If this boots fine then you will need to go back and fix the grub.cfg or load into Ubuntu and open grub customizer again, it should fix this
    16.   Now you have 3 working OS on the machine with one being on a USB! Congrats!
    17.   You can remove the USB with no worry of screwing up your install, but you will not be able to boot into Kali Linux until you replace it. I would suggest only removing it and replacing it while the machine is powered off, but that’s just me.
    Fix Wireless
    Now is the time to do what probably ¾ of you came here for. FIX THE DANG WIRELESS. This is a huge problem from Lenovo’s side that I hope they realize how important Linux is and will fix. I won’t hold my breath though.
    Log into Ubuntu : This is well documented in the following forum post on page 3 by user Haohe:
    http://ubuntuforums.org/showthread.php?t=2215044&page=3
    His has you download quite a large file, mine should be much smaller.
    https://www.dropbox.com/s/puxnnoft3gn2b6l/WiFiFix.zip
    1.     Download the attached package with the fix.
    2.     Connect your USB internet device (tether or ethernet)
    3.     Place the packages somewhere easy to access, in this example I will place them under ~/Desktop/WiFiFix
    4.     Type ‘cd ~/Desktop/WiFiFix/’
    5.     Now we need to prep the tools we need.
    6.     Type ‘sudo apt-get update’ – we did this before, but you know, just in case
    7.     Type ‘sudo apt-get install linux-headers-`uname –r`’   Note around uname-r they are the ` symbol not the ‘ this is located just above the tab on the same key as ~.
    8.     Type ‘make’
    9.     Type ‘sudo cp /lib/modules/3.13.0-24-generic/kernel/drivers/platform/x86/ideapad-laptop.ko ~/ideapad-laptop.ko.backup’
    10.   Type ‘sudo cp ~/Desktop/WiFiFix/ideapad-laptop.ko /lib/modules/3.13.0-24-generic/kernel/drivers/platform/x86/’
    11.   Type ‘sudo modprobe -r ideapad-laptop’
    12.   Type ‘sudo modprobe ideapad-laptop’
    13.   Type ‘sudo rfkill unblock all’
    14.   Type ‘sudo modprobe -r ideapad-laptop’
    15.   Type ‘sudo mv ~/ideapad-laptop.ko.backup /lib/modules/3.13.0-24-generic/kernel/drivers/platform/x86/ideapad-laptop.ko’
    16.   Next we need to blacklist the ideapad module
    17.   Type ‘sudo echo 'blacklist ideapad-laptop' > /etc/modprobe.d/blacklist-ideapad.conf’
    a.     The first time I tried this it wouldn’t work. So I did the following
    b.     ‘sudo touch /etc/modprobe.d/blacklist-ideapad.conf’
    c.     ‘sudo vim /etc/modprobe.d/blacklist-ideapad.conf’
    d.     Enter     blacklist ideapad-laptop
    e.     Exit and save
    18.   Reboot your Yoga 2 13
    19.   Boot into kali and see if you have wireless, if you do then you are done. If not we will need to repeat this process with one small little change.
    Kali Wifi Fix
    1.     Copy the sources.list from the package provided
    2.     Replace /etc/apt/sources.list with the included
    3.     Some of the file path changes but the process remains the same from here.
    Congratulations you now have 3 OSes one portable to other machines and working wifi!
    Thank you
    SirGed

  • Essbase client missing after creation of new windows user profile

    I created a new windows user profile after an apparent corruption of my old one. However, when I open Excel, the Essbase client (add-in) is gone. Smartview is still there. The client doesn't show up after registering Essbase Add-In is executed. I can add the client by navigating to C:\Hyperion\products\Essbase\EssbaseClient\bin and selecting essxleqd.xla and essxcln.xll. The add-in then appears to be installed. However, when I try to connect to Essbase, the connection dialog box does not show up. I'm on version 11.1.1.3 and Excel 2007.
    Is there a way to resolve this short of re-installing the client? Any advice would be appreciated.
    Thanks in advance.
    dave

    I remember the Essbase add-in used to be a small executable of a few MB that was easy to install. It's my understanding that they went to the global installer where they include various product assemblies. The files needed to run the global installer for a simple add-in amount to close to about 4GB in size. Our VPN for remote users is very slow and takes forever to install. I see ther is still a small executable for the Smartview install. Is there a small executable for the Essbase add-in somewhere that I'm not aware of? I can reinstall if that's what it takes. I was hoping there might something a bit less time consuming.
    Thanks John.
    Edited by: DAS80220 on Jun 28, 2011 7:50 AM

  • Mapping a network folder stored on an Apple Xserve to a Windows user a/c.

    I have a number of domain users who need to get there individual network folder mapped to there profile when they log onto the domain from various MAC in the building.
    We use a batch file that maps the users network home folder to there profile when they log onto a PC.
    Does anyone know how to do the same process for those same users loggin onto a MAC OS X leopard machine.
    Users network folders are stored on a Apple Xserve. Authentication comes first from Windows Server 2003 Active Directory.
    (at the moment MAC users accounts are loaded entirely from the Apple Xserve, resulting in the user constantly writing to there profile across the network.
    What I would like to do instead is to 'force the local home directory on startup disk', this is an option in directory utility on each mac. This will force the profile to load locally. Then using some sort of script or batch file map the users network home folder to the desktop of the MAC. Therefore reducing traffic across the network as the user profile will be loaded loally and will only be saving to there netowrk folder)
    Does this make sense, and advice appreciated...???

    Check out the AD-OD Sandbox. I think there may be instructions in there on how to do it:
    http://www.afp548.com/article.php?story=20080304215842264

  • Small photo studio needs config help

    We are a small photo studio and we are about to purchase an xSERVE with 4 500GB drives and add drives to the system as time goes on. I need some advice on the best way to set it up and config it.
    We will be using the xSERVE RAID attached via fibre to a new G5 Tower which will be connected to a gigbit switch. The switch has 3 computers connected @ gigabit. The xSERVE RAID will store all photography jobs currently in post-production and after post is complete the jobs will move off this system and be archived using another system to save space on the RAID.
    3 users (computers) will need to access the RAID to edit the RAW files (15MB/each) jobs and work on photoshop files for retouching. We generate a lot of information and can produce as much as 50 GB / day of shooting. For these jobs we can shoot as many as 7 days in a row, so that would be 350 GB just for the RAW files. We then might retouch 150 files from that job or more depending on the client.
    So my main questions would be how to best set up the RAID and different components? I think RAID 5 would be a good solution. But what other setup/config options should I be considering?
    I know this is not an easy answer and there are multiple options. But if you could be as kind to give some different options/scenarios, I would greatly appreciate it.
    I think its neat that the mac community supports these forums and they have been extremely helpful.
    Thank you mac people.
      Mac OS X (10.4.7)   all computers are running OSX 10.4.7

    I like RAID5 for it's ability to tolerate losing a drive without losing data. One thing that you have to account for is that the price for that you pay for surviving a drive failure is 25% of your disk space. In other words, once you take these four drives and make them into a RAID5, you can expect to have ~1.5TB available. So you may want to add a 5th drive. Personally, as cheap as drives are, I'd put the full 7 in.
    You really don't have enough client machines to bother with a lot of the esoteric stuff. A simple RAID5 gives you durability and enough speed that the network will be the speed bottleneck.
    As you get into these larger filesystems, backups and disaster recovery become much more challenging because of the time it takes to handle massive amounts of data.
    Roger

  • Leopard server and windows users

    We run a mac + pc environment with some users on macs, many on pcs, and our office server is a windows exchange for email etc. As a multi-location consulting firm, we need to set up a good collaboration system that is hosted internally (to preserve confidentiality) and allows us to create a web-based knowledge creation, sharing and collaboration environment. We have looked at some of the new web services offers, but all are hosted by the providers.
    We are considering buying a mac leopard server and have the following questions:
    1/ will windows users be able to use the wiki, chat, calendaring and podcast facilities from their laptops without any problems, and will they have the same easy user interface?
    2/ does the wiki server enable group collaboration like:
    2a/ sending out email notifications on new posts (without changing our exchange server)
    2b/ allowing groups to create project and team specific areas
    3/ The problem we face is one of adoption. If we can make this as easy as facebook, then lots of people will migrate within 48 hours. But is this possible with the leopard server?
    4/ finally, we are based in Singapore and our offices are all in Asia? Do we need a lot of experienced Apple-savvy technical people to create any of these applications, or is leopard server as easy to use as a mac is for a home user?
    Any thoughts or inputs would help. FYI, alternatives we are evaluating are jive software's clearspace or basecamp or zoho's web based suites.
    thanks / Suresh
    Message was edited by: suresh Venugopalan Shankar
    Message was edited by: suresh Venugopalan Shankar

    suresh Venugopalan Shankar wrote:
    1/ will windows users be able to use the wiki, chat, calendaring and podcast facilities from their laptops without any problems, and will they have the same easy user interface?
    Yes, the web based interfaces work just fine for both OS's, the chat server is using jabber (clients on about every OS) and the calendaring is using the standards based iCalendar format.
    2/ does the wiki server enable group collaboration like:
    2a/ sending out email notifications on new posts (without changing our exchange server)
    2b/ allowing groups to create project and team specific areas
    I don't know of functionality to send out e-mail notifications on new posts, but you can subscribe to RSS feeds of things posted in the blog section of the wiki server. I'd need a little bit more information to understand what you're looking for as far as creating project and team specific areas.
    3/ The problem we face is one of adoption. If we can make this as easy as facebook, then lots of people will migrate within 48 hours. But is this possible with the leopard server?
    On the front end most of this stuff is very easy to use, and is in my opinion even simpler than facebook and such.
    4/ finally, we are based in Singapore and our offices are all in Asia? Do we need a lot of experienced Apple-savvy technical people to create any of these applications, or is leopard server as easy to use as a mac is for a home user?
    It's pretty easy to set the server up as long as you read the documentation. There's also a lot of resources online if you have problems (like this forum). It would probably be helpful to have someone familiar with LDAP systems and at least some command line usage on the server, but like I said, the documentation is pretty good. You can go read it to get an idea at http://www.apple.com/server/macosx/resources/
    Hope that helps out some.

  • Yet another windows user unable to burn to CD

    This is my first experience with iTunes and it's turning out to be frustrating. I purchased a Stereo MCs track exclusive to iTunes and want to burn it to a CD so I can listen to it in my car.
    Here's the problem. When I put a blank disc in iTunes pops up a message saying:
    "You've inserted a blank CD or DVD. To burn songs on the disc, select the playlist that contains the songs you want ot burn and then click Burn Disk in the upper-right corner of the iTunes Window."
    I followed the advice by creating a playlist and clicking the burn disc link. It immediately spits out the disc and says "Please insert a blank disc..." ***? So I put the disc back in and nothing happens.
    I've looked through the forums and have not yet seen a solution. I followed all the troubleshooting tips (different media, all updates, updating firmware, prayers, potions and spells) and can't find a solution for this problem.
    My drives work totally fine reading and writing any disc format in any other software (Windows Media, Roxio, Windows Native, Media Monkey.) iTunes can't be this delicate or finicky can it? If it is I'd say it's time to rewrite some code.
    Any help would be appreciated.
    Here's the CD Diagnostics:
    Microsoft Windows XP Home Edition Service Pack 2 (Build 2600)
    Dell Inc. Dimension 8400
    iTunes 6.0.5.20
    CD Driver 2.0.4.3
    CD Driver DLL 2.0.3.2
    LowerFilters: PxHelp20 (2.0.0.0), Pfc (2.5.0.201), Cdr4_xp (8.0.0.212),
    UpperFilters: Cdralw2k (8.0.0.212), GEARAspiWDM (2.0.4.3),
    Video Driver: NVIDIA GeForce 6600 GT\GeForce 6600 GT
    Found aspi32 running.
    IDE\DiskMaxtor6Y160M0_________________________YAR51HW0, Bus Type ATA, Bus Address [1,0]
    IDE\DiskWDCWD1600JD-75HBB0____________________08.02D08, Bus Type ATA, Bus Address [0,0]
    USBSTOR\DiskCanon__MP_Memory_Card_0100, Bus Type USB
    IDE\CdRomHL-DT-STDVD+RW_GRA-4120B_______________G114___, Bus Type ATA, Bus Address [1,0]
    IDE\CdRomHL-DT-STDVD-ROM_GDR8163B_______________0D20___, Bus Type ATA, Bus Address [0,0]
    If you have multiple drives on the same IDE or SCSI bus, these drives may interfere with each other.
    Some computers need an update to the ATA or IDE bus driver, or Intel chipset. If iTunes has problems recognizing CDs or hanging or crashing while importing or burning CDs, check the support site for the manufacturer of your computer or motherboard.
    Current user is administrator.
    E: HL-DT-ST DVD-ROM GDR8163B, Rev 0D20
    Drive is empty.
    F: HL-DT-ST DVD+RW GRA-4120B, Rev G114
    Media in drive is blank.
    Get drive speed succeeded.
    The drive CDR speeds are: 4 8 16 24 32 40.
    The drive CDRW speeds are: 4.
    The drive DVDR speeds are: 4.
    The drive DVDRW speeds are: 4.
    The last failed audio CD burn had error code -128(0xffffff80). It happened on drive F: HL-DT-ST DVD+RW GRA-4120B on -128(0xffffff80) media at speed 0X.

    In the report, your gettin error -128 which means iTunes is cancelling the burn before the Drive actually starts burning. Its most likly due to some conflict.
    Goto www.dell.com and download any firmware updates for the CD ROM, BIOs updates, basicly any update that applies for your model.
    If updating the firmware does not work, try going to edit>preferences>advanced tab>burn sub tab and slow the burn speed from "Max" to dsomething like 8x or 4x.
    Also try a different brand of blank media

  • I need some advice on what kind of virus protection program to buy.I am new to using a Mac,the promotional one is expired .I need to decide soon

    I need advice about what security program to buy the promotional one is expired. To keep the Webfoot program is expensive.Is there another less costly one recommended ?

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Need an advice in Oracle Application Server

    Dear all,
    I need your advice.....
    What I have:
    - 2 servers (Windows 2008 R2 64bit) .. planned as Application Servers
    - Oracle 11g Database installed in a server
    - forms (.fmx) , reports (.rdf) , compiled using Oracle 10g DS R2
    - Oracle 10g Developer Suit R2
    What I want:
    - Install Oracle Application Server in the 2 servers available (Windows 2008 R2)
    - make sure all (.fmx & .rdf) will work im these 2 servers
    - take advantage of the powerful servers
    What I did:
    - Install Oracle 10g AS R2 in both servers
    - configure webcache balance
    What I faced:
    - both servers worked fine except:
    - (.fmx) files cannot be cached
    - slow while opening (.fmx) files
    - AGAIN, SLOW
    ADVICE??
    - Do I need to continue using this installation OR
    - Is there any better installation & configuration that will help get (What I want:)
    Kind Regards

    Hi zzalabri,
    I know i have replied it late,
    Oracle Web Cache uses cacheability rules to store documents. These rules fall into two categories:
    1)Rules for static content, such as GIF, JPEG, or static HTML files
    2)Rules for dynamically generated content created using technologies like Java Server Pages (JSP), Active Server Pages (ASP), PL/SQL Server Pages (PSP), Java Servlets, and Common Gateway Interface (CGI).
    How can I make my server caches .fmx files using webcache (( webcache is configured already but it says "URL contains query string"))..
    The below link would be helpful for setting caching rules for Oracle Webcache
    http://docs.oracle.com/cd/B15904_01/caching.1012/b14046/cache.htm
    Is there any configuration for Application Server 10g R2 AFTER the fresh installation OR it works as it is ..
    The default installation is self tuned to handle a load of approximately 200 users(it depends on network as well as ur DB)
    I knew for sure what makes my server slow, that is because of background images in fmb & fmx files. when I removed them it became fast enough.
    In my environment,i used to staore all this images in gif format(images size max would be 50kb)then store all these images in a jar file and load this jar file through archive_jini(Formsweb.cfg)
    Hope this would be helpful,
    Regards
    Fabian

  • Session/jstl  and load balancing - need expert advice

    After user loggs in, I am getting locale from db and storing it inside userSession along with userLogin. Inside jsp using <fmt> tag to display locale based resource property.
    HttpSession userSession = request.getSession(true);
    userSession.setAttribute("UserLogin", oRS.getString("user_login"));
    Config.set(userSession, Config.FMT_LOCALE, currentLocale);Also using filter after login page to check for User Session. Currently all working fine .
    But if i want to make use of load balancing, whether still it will work?
    1)I understand that if i depend on network config i.e. session request sticks to one server then i believe shld not be a problem
    2)But if that is not the choice then what else ? Client want to make use of serialization technique. I do not know much about it, how to implement it, any sample is greatly appreciated.
    3)what about jstl Config.set(..) whether any changes needed here?
    4)Do i need to change filter code.
    Pls pls help me, i really need expert advice on this.
    regards
    Manisha

    1)If i want cluster server to replicate the session
    then all attributes saved in the session have to be
    serializable.yes.
    2)In docs it is mentioned
    Use setAttribute to Change Session State
    In an HTTP servlet that implements
    javax.servlet.http.HttpSession, use
    HttpSession.setAttribute (which replaces the
    deprecated putValue) to change attributes in a
    session object. If you set attributes in a session
    object with setAttribute, the object and its
    attributes are replicated in a cluster using
    in-memory replication. If you use other set methods
    to change objects within a session, WebLogic Server
    does not replicate those changes. Every time a change
    is made to an object that is in the session,
    setAttribute() should be called to update that object
    across the cluster.
    Whether it means that if I want to store a object
    (which is serializable) e.g. 'String' inside session
    and use setAttribute() method then I do not need to
    make that object implicitly serializable?No, you still need the objects to be serializable.

  • New gen 4 touch. first time on itunes window comes up needs at least version 10.6.3...i downloaded this but still asks every time and cant load music

    New gen 4 touch. first time on itunes window comes up needs at least version 10.6.3...i downloaded this but still asks every time and cant load music

    See the futher information area of Troubleshooting issues with iTunes for Windows updates for download advice and direct links if required.
    See this migrate iTunes library post for advice on moving the library over from a previous computer and this post on deduplication.
    tt2

Maybe you are looking for

  • External HD Not Working Yosemite

    After I updated my Macbook Air to Yosemite, my 2T Lacie Porche Design External HD kept ejecting after a minute or so after being plugged in. I tried all the troubleshooting there is to try in this site. I took my macbook to an Apple store with the HD

  • Partition pruning doesn't work

    Hi all, in this query I've joined 3 tables, each of them partitioned along the field PARTITION_KEY_PRE: SELECT * FROM t_cp_pp_basdat basdat LEFT OUTER JOIN t_cp_pp_custom custom ON basdat.pre_processing_id = custom.pre_processing_id AND basdat.partit

  • Disk Utility Doesn't Function

    Hi Everyone, I recently went to open disk utility to repair permissions after I installed and then uninstalled some software. When I clicked on it, it opened but then the beach ball began to spin and that was that, nothing more. I had to force quit.

  • Restrict authorization in VA01 for partner function field

    Hi all, I need a way to restrict authorization in VA01/VA02 for users so that in the headers tab -> partners, the employee responsible field is locked. Other fields (i.e. ship-to/sold-to should still be changeable) What is the best way to achieve thi

  • My ipod screen needs repair. Will apple do that?

    i have an ipod touch 4th generation that needs repair. Will apple do that for me?