ductapesuprhero
Mar 20, 02:12 AM
I've used iTMS before I bought my iPod Shuffle (way cool!) to simply download music and burn to it CDs. Beats the inconvenience of running out to Walmart and buying the CD for even more money. And I get to search and preview. This is the best way to buy music WITH OR WITHOUT a portable music player.
Also, $0.34 is a nice profit per song * 300+ million songs and growing. Not bad business for just pushing bits! :cool:
Off Topic: Any with an iPod Shuffle think the plastic is reminiscent of Lego (R) plastic?
No one has mentioned the bigger picture... Apple sells music to sell iPods for the same reason they make iLife, Safari, and OSX - to sell computers. Sure, Apple has raked in $100milion in profits from iTunes, and as big as that number sounds, it pales in comparison to the rest of their numbers.
Its all about the halo effect.
Plus, what people don't see is that they are not buying music, or a file etc.; they are purchasing the right to play that file/music which carries with it certain terms and conditions. The DRM is there simply to enforce what you've already agreed to. If its so bad, why do you agree to it in the first place? To download the music? That's both illegal and unethical; it is not your music.
[EDIT: Typo]
Also, $0.34 is a nice profit per song * 300+ million songs and growing. Not bad business for just pushing bits! :cool:
Off Topic: Any with an iPod Shuffle think the plastic is reminiscent of Lego (R) plastic?
No one has mentioned the bigger picture... Apple sells music to sell iPods for the same reason they make iLife, Safari, and OSX - to sell computers. Sure, Apple has raked in $100milion in profits from iTunes, and as big as that number sounds, it pales in comparison to the rest of their numbers.
Its all about the halo effect.
Plus, what people don't see is that they are not buying music, or a file etc.; they are purchasing the right to play that file/music which carries with it certain terms and conditions. The DRM is there simply to enforce what you've already agreed to. If its so bad, why do you agree to it in the first place? To download the music? That's both illegal and unethical; it is not your music.
[EDIT: Typo]
dethmaShine
Apr 20, 05:30 PM
Android is to Windows, as iOS is to Mac OS.
The similarities are astounding � Google is doing the same thing Microsoft did back in the day.
As much as Apple cares about marketshare, the experience is more important to them then the product itself. That's really something.
And there's one more thing. Back then, it was Mac and only mac.
Today, its an ecosystem. Hard to beat.
The similarities are astounding � Google is doing the same thing Microsoft did back in the day.
As much as Apple cares about marketshare, the experience is more important to them then the product itself. That's really something.
And there's one more thing. Back then, it was Mac and only mac.
Today, its an ecosystem. Hard to beat.
LeeTom
Mar 18, 01:55 PM
OPTION 3 - they're sniffing tcp/ip traffic and depending on the traffic can identify if the originating IP has a private addressing scheme. As an ISP, I imagine that you have some leeway to sniff traffic to solve problems, but I'm not sure if this would count as legitimate.
KnightWRX
May 2, 09:45 AM
The Unix Permission system, how a virus on Windows can just access your system and non-owned files, where Unix/Linux dosen't like that.
Is your info from like 1993 ? Because this little known version of Windows dubbed "New Technology" or NT for short brought along something called the NTFS (New Technology File System) that has... *drumroll* ACLs and strict permissions with inheritance...
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
And I say this as a Unix systems administrator/fanboy. The multi-user paradigm that is "Unix security" came to Windows more than 18 years ago. It came to consumer versions of Windows about 9 years ago if you don't count Windows 2000 as a consumer version.
This is exactly the kind of ignorance I'm referring to. The vast majority of users don't differentiate between "virus", "trojan", "phishing e-mail", or any other terminology when they are actually referring to malware as "anything I don't want on my machine." By continuously bringing up inane points like the above, not only are you not helping the situation, you're perpetuating a useless mentality in order to prove your mastery of vocabulary.
Congratulations.
Wait, knowledge is ignorance ? 1984 much ?
The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.
Is your info from like 1993 ? Because this little known version of Windows dubbed "New Technology" or NT for short brought along something called the NTFS (New Technology File System) that has... *drumroll* ACLs and strict permissions with inheritance...
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
And I say this as a Unix systems administrator/fanboy. The multi-user paradigm that is "Unix security" came to Windows more than 18 years ago. It came to consumer versions of Windows about 9 years ago if you don't count Windows 2000 as a consumer version.
This is exactly the kind of ignorance I'm referring to. The vast majority of users don't differentiate between "virus", "trojan", "phishing e-mail", or any other terminology when they are actually referring to malware as "anything I don't want on my machine." By continuously bringing up inane points like the above, not only are you not helping the situation, you're perpetuating a useless mentality in order to prove your mastery of vocabulary.
Congratulations.
Wait, knowledge is ignorance ? 1984 much ?
The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.
spaceballl
Mar 18, 09:25 AM
To be honest, I'm not too upset by this. I've used an iPhone for tethering via jailbreak long before the official support came. I did that fully knowing that I was breaking the rules, and that ATT might mess with me, but they didn't offer an official plan so I knew the risks. I still jailbreak my phone and use MyWi, but I pay for an official tethering plan so I'm not breaking the rules.
calvin66
Aug 29, 01:31 PM
While I'm sure Apple and everyone else has a long way to go with regard to clean manufacturing practices, I'm not sold on Greenpeace's approach to the ratings.
If you look at their scoring system, it is a compilation of Greenpeace's subjective evaluation of a variety of practices by each company. Much of what Dell gets credit for is timelines for changing its business practices, and openness with regard to information on hazardous substances in the manufacturing process. When you look at what they are doing (rather than what they are saying), Dell and Apple score the same--a +2 (partially good) on amounts recycled, and a 0 (bad) for PVC & BFR free products. The report doesn't say how it quantifies these rankings, nor the underlying data regarding the score....which is kinda funny given their harping on full disclosure for all the companies mentioned.
It turns out Greenpeace is like everybody else--manipulating the data to support its goals. It sure doesn't help their credibility.
If you look at their scoring system, it is a compilation of Greenpeace's subjective evaluation of a variety of practices by each company. Much of what Dell gets credit for is timelines for changing its business practices, and openness with regard to information on hazardous substances in the manufacturing process. When you look at what they are doing (rather than what they are saying), Dell and Apple score the same--a +2 (partially good) on amounts recycled, and a 0 (bad) for PVC & BFR free products. The report doesn't say how it quantifies these rankings, nor the underlying data regarding the score....which is kinda funny given their harping on full disclosure for all the companies mentioned.
It turns out Greenpeace is like everybody else--manipulating the data to support its goals. It sure doesn't help their credibility.
ready2switch
Sep 20, 10:15 AM
What do you thnk the iTV offers that a Mini doesn't? I'm not sure it offers anything other than freeing the Mini so it can be used as a computer in front of a computer monitor somewhere else (which is apparently Jobs' view of where a computer should be).
I might have the wrong end of the stick though.
That's pretty much my question too. The iTV is a mini without DVD, storage, OS, or advanced interface? I guess I just don't see a market for this at $300. Waste of time, unless I'm missing something.
I might have the wrong end of the stick though.
That's pretty much my question too. The iTV is a mini without DVD, storage, OS, or advanced interface? I guess I just don't see a market for this at $300. Waste of time, unless I'm missing something.
munkery
May 2, 01:26 PM
The article -> http://blog.intego.com/2011/05/02/macdefender-rogue-anti-malware-program-attacks-macs-via-seo-poisoning/
Here is how it works:
In this case, the file downloaded is a compressed ZIP archive, which, if a specific option in a web browser is checked (Open “safe” files after downloading in Safari, for example), will open. The file is decompressed, and the installer it contains launches ...
If the user continues through the installation process, and enters an administrator’s password, the software will be installed.
Here is how it works:
In this case, the file downloaded is a compressed ZIP archive, which, if a specific option in a web browser is checked (Open “safe” files after downloading in Safari, for example), will open. The file is decompressed, and the installer it contains launches ...
If the user continues through the installation process, and enters an administrator’s password, the software will be installed.
bugfaceuk
Apr 9, 03:37 PM
Well done. Next you will be correcting me referring to my mother as mum.
Why would I do that?
Why would I do that?
leekohler
Apr 24, 11:55 AM
It's about power and control- nothing more.
AlBDamned
Aug 29, 11:47 AM
Not out of sentimentality. The other pcs are so cheap, sometimes it is easier to just buy a new one.
So it's more about how effective, money-wise, it can be to buy a new computer. Doesn't really have much to do about their performance or longevity.
So it's more about how effective, money-wise, it can be to buy a new computer. Doesn't really have much to do about their performance or longevity.
I'mAMac
Aug 29, 03:57 PM
Care to explain that for the rest of us? In what way has UV radition to do with heat radiation?
This is just logic. uv AND heat are more potent due to o-zone decimation. Let me see if i can think of an example...............................erm ok car windows filter out uv rays and are tinted so they keep out some heat. If the window is closed you are a little more protected and a little cooler, if it is open you are a little more unprotected and hotter. (in summertime when the temperature is hotter and the earth is tilted towerd the sun)
This is just logic. uv AND heat are more potent due to o-zone decimation. Let me see if i can think of an example...............................erm ok car windows filter out uv rays and are tinted so they keep out some heat. If the window is closed you are a little more protected and a little cooler, if it is open you are a little more unprotected and hotter. (in summertime when the temperature is hotter and the earth is tilted towerd the sun)
Apple OC
Apr 22, 09:19 PM
I would be willing to bet that if given time this thread will be a carbon copy of that one.
That thread should be stickied, because I can't really think of any issue(relevant to this topic) we didn't cover in it.
well let it be the Mods to merge them ... why tell someone to post in an old thread that died and tell them not to post in this thread?
That thread should be stickied, because I can't really think of any issue(relevant to this topic) we didn't cover in it.
well let it be the Mods to merge them ... why tell someone to post in an old thread that died and tell them not to post in this thread?
macenforcer
Aug 29, 02:44 PM
Um....should we just not heat our homes then? You first.
Even early man built fires to stay warm.
Yeah but he should have been using Taun Tauns. ;)
Even early man built fires to stay warm.
Yeah but he should have been using Taun Tauns. ;)
blindzero
May 5, 05:49 PM
I'm just outside of DC and don't have any issues with dropped calls or missed voicemails.
I did when I was on Edge, but since 3G it's been great.
Call quality on the other hand wildly variesfrom unbearable to decent sometimes within the same call.
I did when I was on Edge, but since 3G it's been great.
Call quality on the other hand wildly variesfrom unbearable to decent sometimes within the same call.
shawnce
Jul 12, 03:16 PM
I believe the max TDP of G5 processor is something like 80 W.
The below lists power consumed by the part, they are not TDP numbers (only part of the power consumed by a chip leaves the chip as heat, heat is what you have to dissipate and is what TDP attempts define).
PPC 970fx power optimized part (@ 2GHz)
40W average, 45-50 W max, 23 W throttle back (half frequency)
PPC 970fx standard part (@ 2GHz)
48W average, 55-60 W max, 29 W throttle back (half frequency)
To me this puts the PPC 970fx below the TDP of a Conroe... I would say the TDP for the PPC 970fx (@2Ghz) is around 40 W (if not lower).
The below lists power consumed by the part, they are not TDP numbers (only part of the power consumed by a chip leaves the chip as heat, heat is what you have to dissipate and is what TDP attempts define).
PPC 970fx power optimized part (@ 2GHz)
40W average, 45-50 W max, 23 W throttle back (half frequency)
PPC 970fx standard part (@ 2GHz)
48W average, 55-60 W max, 29 W throttle back (half frequency)
To me this puts the PPC 970fx below the TDP of a Conroe... I would say the TDP for the PPC 970fx (@2Ghz) is around 40 W (if not lower).
toddybody
Apr 9, 07:39 PM
I wish they'd "poach" Bobby Kotick...and by poach I mean shoot with an elephant gun and mount on Jony Ives wall.
Denarius
Mar 15, 10:55 AM
That's a failure of the German politicians to make a case for nuclear power there (although I imagine that Germany has good potential for hydropower and other renewables).
I think that the opposite could be said for the UK. Over the last few years opinion has turned more pro nuclear. In contrast to Merkel, Cameron turned the Japanese situation into a positive - saying that the UK could 'learn lessons' and make nuclear even safer.
There's too much hysteria over this. This plant has been hit by a force 9 earthquake and a tsunami and yet although some radiation has been released this is by no means anything like as serious as Chernobyl.
In a world where the security risks and economics of oil and natural gas are on their way to being untenable and the renewable energy options cannot realistically meet the world's ever growing energy demands, the benefits of nuclear fission far outweigh the risks, particularly when you consider that the public and worker fatalities relating to fission reactors are dwarfed in comparison to those from energy generation from fossil fuels, petrochemicals and natural gas.
I think that the opposite could be said for the UK. Over the last few years opinion has turned more pro nuclear. In contrast to Merkel, Cameron turned the Japanese situation into a positive - saying that the UK could 'learn lessons' and make nuclear even safer.
There's too much hysteria over this. This plant has been hit by a force 9 earthquake and a tsunami and yet although some radiation has been released this is by no means anything like as serious as Chernobyl.
In a world where the security risks and economics of oil and natural gas are on their way to being untenable and the renewable energy options cannot realistically meet the world's ever growing energy demands, the benefits of nuclear fission far outweigh the risks, particularly when you consider that the public and worker fatalities relating to fission reactors are dwarfed in comparison to those from energy generation from fossil fuels, petrochemicals and natural gas.
GraphicArmy
Jul 11, 11:07 PM
Yeah, I hope apple lower their price point for the pro models. It is way too much. I love mac computer, but come on; the prices vs the PC suckass.
I know Macs are way better then PC, but PCs are good tool too.
I know Macs are way better then PC, but PCs are good tool too.
QCassidy352
Mar 18, 11:41 AM
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8F190 Safari/6533.18.5)
Option 3; STOP trying to cheat the system, and START using your iDevice the way the manufacturer designed it and the way your carrier supports it. (Is it unfair? YES! Are all of us iPhone users getting hosed, even though there's now two carriers? YES)
And while you're at it, knock off the piracy with the napster/limewire/torrent crap.
(Yeah, I said it! SOMEBODY had to!)
Poor thing... he doesn't realize napster and limewire are history. Also, once the data hits my device, it's mine to do with as I please. Thank you very much.
>laughing_girls.jpg.tiff.
No, that's just not true. You signed a contract saying you would only use the data on the phone. You paid for the data with the understanding that it comes with certain contractual restrictions. If you think those restrictions are unfair or arbitrary, you should have signed the contract. In no way shape or form does the contract you signed entitle you to do whatever you want with the data.
It's not a perfect analogy, but compare buying OS 10.6 and installing it on multiple machines with one license. You bought the disc, but that doesn't mean you can do whatever you want with it. The purchase comes with terms regulating the allowed uses.
Option 3; STOP trying to cheat the system, and START using your iDevice the way the manufacturer designed it and the way your carrier supports it. (Is it unfair? YES! Are all of us iPhone users getting hosed, even though there's now two carriers? YES)
And while you're at it, knock off the piracy with the napster/limewire/torrent crap.
(Yeah, I said it! SOMEBODY had to!)
Poor thing... he doesn't realize napster and limewire are history. Also, once the data hits my device, it's mine to do with as I please. Thank you very much.
>laughing_girls.jpg.tiff.
No, that's just not true. You signed a contract saying you would only use the data on the phone. You paid for the data with the understanding that it comes with certain contractual restrictions. If you think those restrictions are unfair or arbitrary, you should have signed the contract. In no way shape or form does the contract you signed entitle you to do whatever you want with the data.
It's not a perfect analogy, but compare buying OS 10.6 and installing it on multiple machines with one license. You bought the disc, but that doesn't mean you can do whatever you want with it. The purchase comes with terms regulating the allowed uses.
blastvurt
Apr 28, 09:57 AM
I just think Apple is making a mistake by not making some low end machines.
I know many here go OMG SHOCK HORROR about anything not made from Aluminium and Unicorn Horn Dust, but in reality, it would pay them, long term to make some nice looking plastic low end machines.
You can make plastic and metal trim things still have a nice finish.
Families walk into stores in the UK, I'm not sure about the US and look at the vast, and I mean VAST array of nice, in their mind, looking PC Laptops, perhaps to buy one for the wife, or one for the kids at school. They may walk past the small Apple table, see the near �1000 price tag, and think, yeah, right, like we're going to get one of those. I could get two good spec'd windows Laptops for that price.
I know people here will disagree as many are in a different wage bracket to "normal consumers" but I can tell you, most people are not going to throw down a grand for a computer for the kids to take to school.
As the only REAL difference between a PC and a Mac these days is the OS it's running, there is no reason Apple could not make a laptop directly at the price point of a medium to low end Windows laptop and then, people may buy them, and perhaps get used to OS X and in years to come go for an iMac.
When you head to the lower end of the market in terms of price, the margins tend to get slimmer, when looking at Apple's pricing and product designs it suggests its not how they operate.
I know many here go OMG SHOCK HORROR about anything not made from Aluminium and Unicorn Horn Dust, but in reality, it would pay them, long term to make some nice looking plastic low end machines.
You can make plastic and metal trim things still have a nice finish.
Families walk into stores in the UK, I'm not sure about the US and look at the vast, and I mean VAST array of nice, in their mind, looking PC Laptops, perhaps to buy one for the wife, or one for the kids at school. They may walk past the small Apple table, see the near �1000 price tag, and think, yeah, right, like we're going to get one of those. I could get two good spec'd windows Laptops for that price.
I know people here will disagree as many are in a different wage bracket to "normal consumers" but I can tell you, most people are not going to throw down a grand for a computer for the kids to take to school.
As the only REAL difference between a PC and a Mac these days is the OS it's running, there is no reason Apple could not make a laptop directly at the price point of a medium to low end Windows laptop and then, people may buy them, and perhaps get used to OS X and in years to come go for an iMac.
When you head to the lower end of the market in terms of price, the margins tend to get slimmer, when looking at Apple's pricing and product designs it suggests its not how they operate.
luminosity
Mar 15, 01:39 AM
Seems very serious to me:
http://www.nytimes.com/2011/03/15/world/asia/15nuclear.html?pagewanted=1&_r=1&hp
�It�s way past Three Mile Island already,� said Frank von Hippel, a physicist and professor at Princeton. �The biggest risk now is that the core really melts down and you have a steam explosion.�
http://www.nytimes.com/2011/03/15/world/asia/15nuclear.html?pagewanted=1&_r=1&hp
�It�s way past Three Mile Island already,� said Frank von Hippel, a physicist and professor at Princeton. �The biggest risk now is that the core really melts down and you have a steam explosion.�
Lennholm
May 2, 10:30 AM
Is your info from like 1993 ? Because this little known version of Windows dubbed "New Technology" or NT for short brought along something called the NTFS (New Technology File System) that has... *drumroll* ACLs and strict permissions with inheritance...
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
And I say this as a Unix systems administrator/fanboy. The multi-user paradigm that is "Unix security" came to Windows more than 18 years ago. It came to consumer versions of Windows about 9 years ago if you don't count Windows 2000 as a consumer version.
Wait, knowledge is ignorance ? 1984 much ?
The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.
Great post! I think the biggest reason security has been so problematic on Windows, aside from the fact that it's the biggest target, is that the default user type is administrator.
The kind of issue in this case, caused by user ignorance, is really the only threat that exist for Windows since XP SP2. Internet Explorer has had sufficient, but very annoying, security measures against this since version 7 and I'm surprised Safari can let these kind of things slide through so easily.
Security in Windows has been pretty solid for years now, but that hasn't stopped many Linux/Unix/OSX-fanboys from claiming Windows security is like a swizz cheese. They don't even bother to do some research, they just keep shouting the same old mantra.
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
And I say this as a Unix systems administrator/fanboy. The multi-user paradigm that is "Unix security" came to Windows more than 18 years ago. It came to consumer versions of Windows about 9 years ago if you don't count Windows 2000 as a consumer version.
Wait, knowledge is ignorance ? 1984 much ?
The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.
Great post! I think the biggest reason security has been so problematic on Windows, aside from the fact that it's the biggest target, is that the default user type is administrator.
The kind of issue in this case, caused by user ignorance, is really the only threat that exist for Windows since XP SP2. Internet Explorer has had sufficient, but very annoying, security measures against this since version 7 and I'm surprised Safari can let these kind of things slide through so easily.
Security in Windows has been pretty solid for years now, but that hasn't stopped many Linux/Unix/OSX-fanboys from claiming Windows security is like a swizz cheese. They don't even bother to do some research, they just keep shouting the same old mantra.
Bill McEnaney
Mar 27, 09:17 PM
The goal of any ethical psychological treatment is only to treat the conflict that causes pain. The patient is considered healthy when his thoughts and behaviors do not interfere with his ability to lead a fulfilling life, not when he changes his thoughts and behaviors to ones endorsed by the therapist. Anything else is abuse of the patient and psychological malpractice.
But what if changed thoughts and changed behaviors would make people even happier than than they would be without the changes?
To tell someone who is in conflict over his sexual orientation that he must change it to be well is no different than telling an anorexic to lose more weight so she doesn't feel so fat. It is indulging the conflict to produce conforming behavior rather than treating the conflict to produce a healthy patient.
Not even Nicolosi tells his clients that they need to change their sexual orientation. He says that NARTH is for people who want to change it. In a video I posted to this discussion, he says that therapy doesn't work well for clients who tell him they want to change because the Bible teaches that they shouldn't have homosexual sex. You may already have read my post about Fr. John Harvey's apostolate to people who feel same-sex attraction. Again, that organization doesn't try to change anyone's sexual orientation.
But what if changed thoughts and changed behaviors would make people even happier than than they would be without the changes?
To tell someone who is in conflict over his sexual orientation that he must change it to be well is no different than telling an anorexic to lose more weight so she doesn't feel so fat. It is indulging the conflict to produce conforming behavior rather than treating the conflict to produce a healthy patient.
Not even Nicolosi tells his clients that they need to change their sexual orientation. He says that NARTH is for people who want to change it. In a video I posted to this discussion, he says that therapy doesn't work well for clients who tell him they want to change because the Bible teaches that they shouldn't have homosexual sex. You may already have read my post about Fr. John Harvey's apostolate to people who feel same-sex attraction. Again, that organization doesn't try to change anyone's sexual orientation.
No comments:
Post a Comment