neilp4453
Feb 12, 03:14 AM
All I'm going to say is that Apple isn't doing enough to keep iPhone users...well, iPhone users!
Two of my cousins now own droids. One had an iPhone and got a Droid once he started working at a Verizon store. The damn phone is jampacked with features that Apple refuses to include.
In order for Apple to improve their device, they must first be beaten. Otherwise, they will sit on their asses just watching the cash come in. They do it with their current line of computers and they are doing it now.
I love my iPhone but I think it is just that time. Hopefully they can come back. It is time to loosen their grip on the App Store, let Google do their "thang" and add numerous features that are available NATIVELY!
Two of my cousins now own droids. One had an iPhone and got a Droid once he started working at a Verizon store. The damn phone is jampacked with features that Apple refuses to include.
In order for Apple to improve their device, they must first be beaten. Otherwise, they will sit on their asses just watching the cash come in. They do it with their current line of computers and they are doing it now.
I love my iPhone but I think it is just that time. Hopefully they can come back. It is time to loosen their grip on the App Store, let Google do their "thang" and add numerous features that are available NATIVELY!

sososowhat
Sep 26, 12:52 AM
http://www.macrumors.com/images/macrumorsthreadlogo.gif (http://www.macrumors.com)
(expected later this quarter to PC manufacturers according to Daily Tech).
That would mean sometime in the next 5 days.
(expected later this quarter to PC manufacturers according to Daily Tech).
That would mean sometime in the next 5 days.

dethmaShine
May 2, 09:24 AM
Hate to break it to you, but it's someone at Apple that flagged "Zip files" as safe for Safari to open ;)
That guy needs his head examined.
That's very true and has a lot of potential.
But as far as I understand, the extracted .zip in finder returns a folder which contains all the files.
Ain't that true?
But even if that's not true and for a second we believe that the finder does not automatically extract .zip archives; what if a person himself opens a .zip archive to look for files?
There's a certain potential with that kind of behavior itself.
That guy needs his head examined.
That's very true and has a lot of potential.
But as far as I understand, the extracted .zip in finder returns a folder which contains all the files.
Ain't that true?
But even if that's not true and for a second we believe that the finder does not automatically extract .zip archives; what if a person himself opens a .zip archive to look for files?
There's a certain potential with that kind of behavior itself.
NebulaClash
Apr 28, 01:26 PM
Personally, I very VERY much hope Apple do allow the iPad to grow into a fully independent device and break it's lock down link to iTunes.
Unfortunately, seeing as the iTunes link is Apple's money making link, I cannot see them allowing this to happen for a long time, meaning it will never grow to it's full potential as a fully independent device.
Well, in the future I'm talking about involving cloud computing, the link will be there but it will be over the air. But it seems you are talking about not having any link to iTunes. But then what do you want to link it to? The Android app market? Cydia? I mean, you need to have some place to link it to in order to hook into the world of apps (plus backups, etc.) Even our PCs are not standalone by that definition, basically needing a Net connection to get much done.
So what is an independent device to you? Independent of what?
Unfortunately, seeing as the iTunes link is Apple's money making link, I cannot see them allowing this to happen for a long time, meaning it will never grow to it's full potential as a fully independent device.
Well, in the future I'm talking about involving cloud computing, the link will be there but it will be over the air. But it seems you are talking about not having any link to iTunes. But then what do you want to link it to? The Android app market? Cydia? I mean, you need to have some place to link it to in order to hook into the world of apps (plus backups, etc.) Even our PCs are not standalone by that definition, basically needing a Net connection to get much done.
So what is an independent device to you? Independent of what?

silentnite
May 4, 11:49 AM
Safari is not set as a default for me & I only use it if Mozilla is stalling but this is only the beginning for apple with it's continued success comes a lot of security issues for the future.
Peace
Sep 12, 04:44 PM
This is the device I said was coming with the exception of the Hard Drive and I bet before it's released it has one.

bboucher790
Mar 18, 10:33 AM
I don't think it is a bad thing for AT+T to prevent people from tethering to a laptop on an unlimited cell phone plan. Those people are just taking advantage of the system, and wasting bandwidth that the rest of us could use.
As far as I'm concerned it is the same as going to an all you can eat restaurant and sharing your food between two people, while only paying for one. It isn't a serious crime, but it is stealing, and you know that if you get caught you will have to stop. I'm not going to feel bad for these people that are using 5+GB per month.
+11
The whole "it's MY data, I can do what I want with it!" argument is countered by your perfect analogy with a buffet. I tip my hat to you on that one. If you're at an all-you-can-eat buffet, it doesn't mean you can share your food with your entire family.
I've always believed that unlimited data, on a smartphone, enables you to connect to the internet as much as you want on the device you're contracted to. It's not like home internet where you can share the connection, nor have I ever imagined it would be.
I think that people just like to get "angry at the man" when they don't get things the way they want. ATT is trying to improve their network, good for them.
As far as I'm concerned it is the same as going to an all you can eat restaurant and sharing your food between two people, while only paying for one. It isn't a serious crime, but it is stealing, and you know that if you get caught you will have to stop. I'm not going to feel bad for these people that are using 5+GB per month.
+11
The whole "it's MY data, I can do what I want with it!" argument is countered by your perfect analogy with a buffet. I tip my hat to you on that one. If you're at an all-you-can-eat buffet, it doesn't mean you can share your food with your entire family.
I've always believed that unlimited data, on a smartphone, enables you to connect to the internet as much as you want on the device you're contracted to. It's not like home internet where you can share the connection, nor have I ever imagined it would be.
I think that people just like to get "angry at the man" when they don't get things the way they want. ATT is trying to improve their network, good for them.

eternlgladiator
Mar 11, 08:57 AM
+1
didnt know the word tw@t was used over the pond... lol amezzin
I thought it was appropriate for this line. It's not in my main repertoire but I thought it worked.
didnt know the word tw@t was used over the pond... lol amezzin
I thought it was appropriate for this line. It's not in my main repertoire but I thought it worked.

Multimedia
Sep 26, 04:48 PM
You're kidding, right? Here we are sitting around waiting on the C2D and you're saying that in about two months we'll have the option to buy a QUAD? Please say your kidding. PLEASE.No I am not kidding. What option to buy a Quad? Clovertowns are Quads used in pairs to make 8-core OctoMacs not Quads. Clovertowns are scheduled to begin shipping in November. This is not news. It's been known for at least 3 months. Did you not see that thread?
Mikael
Jul 12, 03:42 PM
I think his point was that most tech geeks are freaking out about the revolutionary core 2 architecture, be it in the conroe, woodcrest or merom. For people to view conroe as a lesser chip in some way smacks of mac snobbery and I tend to agree with him.
Exactly. Numerous people have tried to explain that Merom, Conroe and Woodcrest basically are the same CPU, yet few people seem to have understood it yet. The differences between the parts are almost exclusively external (or atleast not related to the execution core), like socket and FSB frequency. The core architecture has even been said by Intel reps to be the same. The only reason for a Woodcrest CPU to perform better than a Conroe (the non-Extreme edition) would be because of the slightly faster FSB. This advantage could soon be negated by the use of FB-DIMMs.
So, why get so worked up over this?
Exactly. Numerous people have tried to explain that Merom, Conroe and Woodcrest basically are the same CPU, yet few people seem to have understood it yet. The differences between the parts are almost exclusively external (or atleast not related to the execution core), like socket and FSB frequency. The core architecture has even been said by Intel reps to be the same. The only reason for a Woodcrest CPU to perform better than a Conroe (the non-Extreme edition) would be because of the slightly faster FSB. This advantage could soon be negated by the use of FB-DIMMs.
So, why get so worked up over this?
mroddjob
Apr 13, 05:24 AM
I'm confused as to why everyone is saying this is a step down from FCP7, from what I saw of the feeds apple were just showcasing some of the new features. I may be wrong but i didn't see anywhere where they said they were taking functionality out. They didn't mention color or the rest of FCS but they didn't say they were getting rid of everything. So how can people say this has dropped down to a prosumer level?
If all they did was re-write with 64 bit support then it would be a step up, but they also added some new useful features, (may not be game changing but i'm sure everyone will find something that will be helpful rather than a hindrance). In which case, in my book this still makes it pro software.
It was a first look at beta software, they haven't said they've removed anything so everything people are saying is just speculation for the sake of complaining.
If all they did was re-write with 64 bit support then it would be a step up, but they also added some new useful features, (may not be game changing but i'm sure everyone will find something that will be helpful rather than a hindrance). In which case, in my book this still makes it pro software.
It was a first look at beta software, they haven't said they've removed anything so everything people are saying is just speculation for the sake of complaining.
Lennholm
May 2, 10:30 AM
Is your info from like 1993 ? Because this little known version of Windows dubbed "New Technology" or NT for short brought along something called the NTFS (New Technology File System) that has... *drumroll* ACLs and strict permissions with inheritance...
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
And I say this as a Unix systems administrator/fanboy. The multi-user paradigm that is "Unix security" came to Windows more than 18 years ago. It came to consumer versions of Windows about 9 years ago if you don't count Windows 2000 as a consumer version.
Wait, knowledge is ignorance ? 1984 much ?
The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.
Great post! I think the biggest reason security has been so problematic on Windows, aside from the fact that it's the biggest target, is that the default user type is administrator.
The kind of issue in this case, caused by user ignorance, is really the only threat that exist for Windows since XP SP2. Internet Explorer has had sufficient, but very annoying, security measures against this since version 7 and I'm surprised Safari can let these kind of things slide through so easily.
Security in Windows has been pretty solid for years now, but that hasn't stopped many Linux/Unix/OSX-fanboys from claiming Windows security is like a swizz cheese. They don't even bother to do some research, they just keep shouting the same old mantra.
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
And I say this as a Unix systems administrator/fanboy. The multi-user paradigm that is "Unix security" came to Windows more than 18 years ago. It came to consumer versions of Windows about 9 years ago if you don't count Windows 2000 as a consumer version.
Wait, knowledge is ignorance ? 1984 much ?
The fact is, understanding the proper terminology and different payloads and impacts of the different types of malware prevents unnecessary panic and promotes a proper security strategy.
I'd say it's people that try to just lump all malware together in the same category, making a trojan that relies on social engineering sound as bad as a self-replicating worm that spreads using a remote execution/privilege escalation bug that are quite ignorant of general computer security.
Great post! I think the biggest reason security has been so problematic on Windows, aside from the fact that it's the biggest target, is that the default user type is administrator.
The kind of issue in this case, caused by user ignorance, is really the only threat that exist for Windows since XP SP2. Internet Explorer has had sufficient, but very annoying, security measures against this since version 7 and I'm surprised Safari can let these kind of things slide through so easily.
Security in Windows has been pretty solid for years now, but that hasn't stopped many Linux/Unix/OSX-fanboys from claiming Windows security is like a swizz cheese. They don't even bother to do some research, they just keep shouting the same old mantra.
samcraig
Mar 18, 09:20 AM
Quite simply, you're wrong, and worse you're creating fantasy. You claim tethering was not agreed upon. What was, exactly? Using safari? What about Opera?
I think not. Get your frigging facts straight before opening your mouth. AT&T screwed up when they offered unlimited data, and they're content to break the law in order to fix their mistake.
FAIL
6.2 What Are The Intended Purposes Of The Wireless Data Service?
Print this section | Print this page
Except as may otherwise be specifically permitted or prohibited for select data plans, data sessions may be conducted only for the following purposes: (i) Internet browsing; (ii) email; and (iii) intranet access (including access to corporate intranets, email, and individual productivity applications like customer relationship management, sales force, and field service automation). While most common uses for Internet browsing, email and intranet access are permitted by your data plan, there are certain uses that cause extreme network capacity issues and interference with the network and are therefore prohibited. Examples of prohibited uses include, without limitation, the following: (i) server devices or host computer applications, including, but not limited to, Web camera posts or broadcasts, automatic data feeds, automated machine-to-machine connections or peer-to-peer (P2P) file sharing; (ii) as a substitute or backup for private lines, wireline s or full-time or dedicated data connections; (iii) "auto-responders," "cancel-bots," or similar automated or manual routines which generate excessive amounts of net traffic, or which disrupt net user groups or email use by others; (iv) "spam" or unsolicited commercial or bulk email (or activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email); (v) any activity that adversely affects the ability of other people or systems to use either AT&T's wireless services or other parties' Internet-based resources, including "denial of service" (DoS) attacks against another network host or individual user; (vi) accessing, or attempting to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of AT&T's wireless network or another entity's network or systems; (vii) software or other devices that maintain continuous active Internet connections when a computer's connection would otherwise be idle or any "keep alive" functions, unless they adhere to AT&T's data retry requirements, which may be changed from time to time. This means, by way of example only, that checking email, surfing the Internet, downloading legally acquired songs, and/or visiting corporate intranets is permitted, but downloading movies using P2P file sharing services, redirecting television signals for viewing on Personal Computers, web broadcasting, and/or for the operation of servers, telemetry devices and/or Supervisory Control and Data Acquisition devices is prohibited. Furthermore, plans (unless specifically designated for tethering usage) cannot be used for any applications that tether the device (through use of, including without limitation, connection kits, other phone/smartphone to computer accessories, BLUETOOTH� or any other wireless technology) to Personal Computers (including without limitation, laptops), or other equipment for any purpose. Accordingly, AT&T reserves the right to (i) deny, disconnect, modify and/or terminate Service, without notice, to anyone it believes is using the Service in any manner prohibited or whose usage adversely impacts its wireless network or service levels or hinders access to its wireless network, including without limitation, after a significant period of inactivity or after sessions of excessive usage and (ii) otherwise protect its wireless network from harm, compromised capacity or degradation in performance, which may impact legitimate data flows. You may not send solicitations to AT&T's wireless subscribers without their consent. You may not use the Services other than as intended by AT&T and applicable law. Plans are for individual, non-commercial use only and are not for resale. AT&T may, but is not required to, monitor your compliance, or the compliance of other subscribers, with AT&T's terms, conditions, or policies.
I think not. Get your frigging facts straight before opening your mouth. AT&T screwed up when they offered unlimited data, and they're content to break the law in order to fix their mistake.
FAIL
6.2 What Are The Intended Purposes Of The Wireless Data Service?
Print this section | Print this page
Except as may otherwise be specifically permitted or prohibited for select data plans, data sessions may be conducted only for the following purposes: (i) Internet browsing; (ii) email; and (iii) intranet access (including access to corporate intranets, email, and individual productivity applications like customer relationship management, sales force, and field service automation). While most common uses for Internet browsing, email and intranet access are permitted by your data plan, there are certain uses that cause extreme network capacity issues and interference with the network and are therefore prohibited. Examples of prohibited uses include, without limitation, the following: (i) server devices or host computer applications, including, but not limited to, Web camera posts or broadcasts, automatic data feeds, automated machine-to-machine connections or peer-to-peer (P2P) file sharing; (ii) as a substitute or backup for private lines, wireline s or full-time or dedicated data connections; (iii) "auto-responders," "cancel-bots," or similar automated or manual routines which generate excessive amounts of net traffic, or which disrupt net user groups or email use by others; (iv) "spam" or unsolicited commercial or bulk email (or activities that have the effect of facilitating unsolicited commercial email or unsolicited bulk email); (v) any activity that adversely affects the ability of other people or systems to use either AT&T's wireless services or other parties' Internet-based resources, including "denial of service" (DoS) attacks against another network host or individual user; (vi) accessing, or attempting to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of AT&T's wireless network or another entity's network or systems; (vii) software or other devices that maintain continuous active Internet connections when a computer's connection would otherwise be idle or any "keep alive" functions, unless they adhere to AT&T's data retry requirements, which may be changed from time to time. This means, by way of example only, that checking email, surfing the Internet, downloading legally acquired songs, and/or visiting corporate intranets is permitted, but downloading movies using P2P file sharing services, redirecting television signals for viewing on Personal Computers, web broadcasting, and/or for the operation of servers, telemetry devices and/or Supervisory Control and Data Acquisition devices is prohibited. Furthermore, plans (unless specifically designated for tethering usage) cannot be used for any applications that tether the device (through use of, including without limitation, connection kits, other phone/smartphone to computer accessories, BLUETOOTH� or any other wireless technology) to Personal Computers (including without limitation, laptops), or other equipment for any purpose. Accordingly, AT&T reserves the right to (i) deny, disconnect, modify and/or terminate Service, without notice, to anyone it believes is using the Service in any manner prohibited or whose usage adversely impacts its wireless network or service levels or hinders access to its wireless network, including without limitation, after a significant period of inactivity or after sessions of excessive usage and (ii) otherwise protect its wireless network from harm, compromised capacity or degradation in performance, which may impact legitimate data flows. You may not send solicitations to AT&T's wireless subscribers without their consent. You may not use the Services other than as intended by AT&T and applicable law. Plans are for individual, non-commercial use only and are not for resale. AT&T may, but is not required to, monitor your compliance, or the compliance of other subscribers, with AT&T's terms, conditions, or policies.

Warbrain
Sep 26, 07:43 AM
I'll be holding my Mac Pro purchase off for a while...
Why? You'll be waiting for a bit of a long time...
Why? You'll be waiting for a bit of a long time...
d0minick
Mar 18, 06:04 AM
Until then I'm stuck because I believe in playing by the rules, no matter how F-d up they are...
How could you be the real IT guy if you believe that? Never meant an IT guy that had to "tweak" a few things to get a system to work, the best toys do what the manufacturer never intended!
How could you be the real IT guy if you believe that? Never meant an IT guy that had to "tweak" a few things to get a system to work, the best toys do what the manufacturer never intended!

flopticalcube
Apr 25, 10:47 AM
Sense tells me that the truth value of God's existence is unknowable. However, in my opinion, it's not just unknowable but also totally irrelevant for how we should live. In other words, it is not important to know if there is a God or not. Is that closer to agnosticism or to atheism (if we separate these two notions completely)?
Absolutely correct. It is irrelevant because it is unknowable so let's not pretend or imagine or try to know the unknowable. Let's live our lives in peace.
Floptical cube's post sounds like an excellent description of agnosticism. But every atheist I've ever met has believed that there's God.
I think it's important to remember that, although people can feel emotions about beliefs, beliefs aren't emotions. I don't feel that there's a God. I believe that there is one. I feel happiness, sadness, loneliness, hurt, and so forth. I believe that those feelings exist, but I don't believe that happiness, say, is either a truth or a falsehood. I don't believe that it's a conformity between my intellect and reality. My belief that there's a pine tree in my front yard is true because there is a pine tree there that causes my belief to be true. The tree will still be there 10 minutes from now, even if someone or something fools me into believing that it's gone. The truth or falsehood of my belief depends on the way things are in the world. I can't cause that tree to exist by merely believing that it does exist. I can't make it stop existing by simply believing that it doesn't exist, can I?
I certainly feel that most atheists are what I would call agnostic atheists. They lack belief in a god but leave the question of such a being existing either open and yet to be proved or unknowable and, therefore, pointless to contemplate. Only a so-called gnostic atheist would say they have seen sufficient evidence to convince them there is no god and I have not seen to many of them in my travels. It's more likely that they have yet to see sufficient evidence so, while they do not specifically believe in his existence, they cannot categorically deny it either. The blurry line between atheism and agnosticism is fairly crowded, I think.
Absolutely correct. It is irrelevant because it is unknowable so let's not pretend or imagine or try to know the unknowable. Let's live our lives in peace.
Floptical cube's post sounds like an excellent description of agnosticism. But every atheist I've ever met has believed that there's God.
I think it's important to remember that, although people can feel emotions about beliefs, beliefs aren't emotions. I don't feel that there's a God. I believe that there is one. I feel happiness, sadness, loneliness, hurt, and so forth. I believe that those feelings exist, but I don't believe that happiness, say, is either a truth or a falsehood. I don't believe that it's a conformity between my intellect and reality. My belief that there's a pine tree in my front yard is true because there is a pine tree there that causes my belief to be true. The tree will still be there 10 minutes from now, even if someone or something fools me into believing that it's gone. The truth or falsehood of my belief depends on the way things are in the world. I can't cause that tree to exist by merely believing that it does exist. I can't make it stop existing by simply believing that it doesn't exist, can I?
I certainly feel that most atheists are what I would call agnostic atheists. They lack belief in a god but leave the question of such a being existing either open and yet to be proved or unknowable and, therefore, pointless to contemplate. Only a so-called gnostic atheist would say they have seen sufficient evidence to convince them there is no god and I have not seen to many of them in my travels. It's more likely that they have yet to see sufficient evidence so, while they do not specifically believe in his existence, they cannot categorically deny it either. The blurry line between atheism and agnosticism is fairly crowded, I think.
starflyer
Apr 15, 10:58 AM
and 8 morons hit the "negative" button. That's why videos like this are necessary. Because there are a lot of stupid people out there who don't understand the world as it is.
Maybe they hit negative because they think it's sad that something like this even has to exist.
Maybe they hit negative because they think it's sad that something like this even has to exist.

Apple OC
Apr 24, 06:15 PM
just what we need in the world ... a McPeace treaty:cool:

CylonGlitch
Mar 18, 09:55 AM
Those of you who are so upset over this, please, get a lawyer, and start a class action lawsuit. Let's get this matter settled, should we, or should we not be allowed to use our data any way we want?
I'm not a lawyer, but I do think we should be allowed to use our data how we want. If you're on the 2GB plan, who cares if you use 2GB tethering or 2GB of emails, you should be allowed to use it any way you want.
With an unlimited plan, yeah, there needs to be something in place because truly unlimited just bring out a few a-holes who abuse it and makes life miserable for everyone.
Still; let a judge decide, get this going and see who finally wins. Best case, AT&T loses and we get tethering for our data plans. Worst case, AT&T offers no unlimited plans anymore and at the end of every contract EVERYONE has to get off, and you still have to pay for tethering. I'm guessing we'll see something in the middle. You can stay on unlimited, but are not allowed to tether, or you can move to a capped plan (2gb, 4gb, etc..) but can use it any way you want.
Go for it, make it happen, let's get it settled!
I'm not a lawyer, but I do think we should be allowed to use our data how we want. If you're on the 2GB plan, who cares if you use 2GB tethering or 2GB of emails, you should be allowed to use it any way you want.
With an unlimited plan, yeah, there needs to be something in place because truly unlimited just bring out a few a-holes who abuse it and makes life miserable for everyone.
Still; let a judge decide, get this going and see who finally wins. Best case, AT&T loses and we get tethering for our data plans. Worst case, AT&T offers no unlimited plans anymore and at the end of every contract EVERYONE has to get off, and you still have to pay for tethering. I'm guessing we'll see something in the middle. You can stay on unlimited, but are not allowed to tether, or you can move to a capped plan (2gb, 4gb, etc..) but can use it any way you want.
Go for it, make it happen, let's get it settled!
grue
Apr 13, 12:04 AM
The BBC just purchased 4,000 Premiere systems.
The BBC is also funded by money stolen from people as a punishment for owning a television. Let's not base conceptualizations of rational thought on their behavior.
The BBC is also funded by money stolen from people as a punishment for owning a television. Let's not base conceptualizations of rational thought on their behavior.
TheRealTVGuy
Mar 18, 01:56 AM
So if you're sticking at 4.1.0 and they aren't monitoring, then they should be monitoring 3.x even less, no?
All the more reason for me to stick with 3.1.3 on my 3G.
BL.
Wow... was multi-tasking supported that early, or did we not get that until 4.0. It's early here in Florida and I can't remember.
But hey, if its working for you... go with it!
All the more reason for me to stick with 3.1.3 on my 3G.
BL.
Wow... was multi-tasking supported that early, or did we not get that until 4.0. It's early here in Florida and I can't remember.
But hey, if its working for you... go with it!
Multimedia
Nov 1, 01:49 AM
FBDIMMs are designed for maximum bandwidth, not for best possible latency, so they cope with this better than any other kind of memory. You may read that bandwidth is the bottleneck for these processors. However, that is only the case for pure copying operations. Code that calls memcpy () on all eight cores simultaneously will run out of steam quite quickly. However, most code does actually do some work with that data (like video compression), and the bandwidth won't be that big a problem.
Lets say you compress a two hour dual layer DVD with Handbrake at 1 Megabit per second. DVD = 9.5 GB takes ages to read from DVD, takes about two seconds to copy in memory. Copying the 1 Megabit takes two dozen microseconds. Most of the action will happen in L2 cache, so you should be fine.Thank you for the positive feedback. But I don't rip anything from DVDs much at all. I crush EyeTV2 broadcast recordings with Toast 7.1 (UB) to DVD Images on hard drives. Then I 2-pass rip from those images with Handbrake to mp4 so I'm not having any optical bottleneck at all. From what you say, this should be much faster like I'm hoping with all those cores.
Lets say you compress a two hour dual layer DVD with Handbrake at 1 Megabit per second. DVD = 9.5 GB takes ages to read from DVD, takes about two seconds to copy in memory. Copying the 1 Megabit takes two dozen microseconds. Most of the action will happen in L2 cache, so you should be fine.Thank you for the positive feedback. But I don't rip anything from DVDs much at all. I crush EyeTV2 broadcast recordings with Toast 7.1 (UB) to DVD Images on hard drives. Then I 2-pass rip from those images with Handbrake to mp4 so I'm not having any optical bottleneck at all. From what you say, this should be much faster like I'm hoping with all those cores.
Doraemon
Aug 29, 02:15 PM
- They've indirectly caused the deaths of thousands of starving Africans by preventing the development of genetically-engineered foods.
That by far the stupidest thing, I have read in a very long time. It's plain absurd.
That by far the stupidest thing, I have read in a very long time. It's plain absurd.
bobsentell
Mar 18, 08:47 AM
Some of the responses on this thread are really amusing.
The people who are defending AT&T's actions are either astroturfing shills, or dolts.
Here's a newsflash: Just because you put something into a contract doesn't make it legal or make it fair. What if AT&T stipulated that they were allowed to come by your house and give you a wedgie every time you checked your voicemail...? Would you still be screaming about how its "justified" because its written on some lop-sided, legalese-ridden piece of paper?
This is a specious argument because they didn't put that in your contract. Your contract says you have no interest in tethering, yet you use it anyway. So it's not AT&T that's doing anything illegal.
If you think AT&T is doing something illegal, then take your dollars to Verizon.
The people who are defending AT&T's actions are either astroturfing shills, or dolts.
Here's a newsflash: Just because you put something into a contract doesn't make it legal or make it fair. What if AT&T stipulated that they were allowed to come by your house and give you a wedgie every time you checked your voicemail...? Would you still be screaming about how its "justified" because its written on some lop-sided, legalese-ridden piece of paper?
This is a specious argument because they didn't put that in your contract. Your contract says you have no interest in tethering, yet you use it anyway. So it's not AT&T that's doing anything illegal.
If you think AT&T is doing something illegal, then take your dollars to Verizon.
No comments:
Post a Comment