samcraig
Mar 18, 12:37 PM
I want that text so I can call them up and lambast the eff out of them.
I'm not jailbroken, I don't tether. But it pisses me off that they are wanting to limit data.
I just checked, my data use per month for the last six months is anywhere from 4GB-7GB a month. Mostly because I stream a radio station. Pandora is better at managing data sending it in packets, this app uses straight streaming.
I'll be staying off my wifi at home and at work.
Ok - so you didn't even get the text. You might never get the text - but yet you're still going to have a tantrum and "teach ATT a lesson" ??? Ok - good luck with that.
I never said anything about it being an accident. I also don't think your argument is "clear" unless you have some kind of internal information that the rest of us don't know about.
If it is really that simple to develop "rules and logic engines" to crack down on tethering, why did it take almost a full year (after introducing tethering) to do it? A logical evaluation of network activity (one that can be done by a computer) works in many cases, but there are always instances where it misses things, or triggers a false alert. AT&T is limited in this regard. I also don't see anything special about the mobile hotspot feature that allows AT&T more access to information that it did not have previously. See the rest of my post.
If people aren't being careful about what they are doing online while tethered (for example, they are doing things their iPhones cannot do natively), it's pretty simple for AT&T to see that kind of activity. But someone who is smart about it can probably get by indefinitely.
I think AT&T is starting to panicking about the people who are leaving to go to Verizon. They need to make sure they are milking every dime they can get out of the iPhone users they still have
You missed the point of what I said in my post. For one - I explained why they may have waited. Pretty clearly.
I'm guessing a lot of people here are pissing and moaning about something that hasn't even affected them (yet) and might not ever. Which is even sillier. It sounds like very few (if any) on this thread actually GOT the email/txt.
And to reiterate what I said several posts ago (but so few people read full threads...) that I don't agree with ATT charging twice for people on CAPPED plans. If you pay for 2 gigs - you should get 2 gigs - no matter what. It's finite.
But unlimited data is a different matter. And for those that can't understand or see the difference - there's little use in trying to explain it over and over. You don't get it.
I'm not jailbroken, I don't tether. But it pisses me off that they are wanting to limit data.
I just checked, my data use per month for the last six months is anywhere from 4GB-7GB a month. Mostly because I stream a radio station. Pandora is better at managing data sending it in packets, this app uses straight streaming.
I'll be staying off my wifi at home and at work.
Ok - so you didn't even get the text. You might never get the text - but yet you're still going to have a tantrum and "teach ATT a lesson" ??? Ok - good luck with that.
I never said anything about it being an accident. I also don't think your argument is "clear" unless you have some kind of internal information that the rest of us don't know about.
If it is really that simple to develop "rules and logic engines" to crack down on tethering, why did it take almost a full year (after introducing tethering) to do it? A logical evaluation of network activity (one that can be done by a computer) works in many cases, but there are always instances where it misses things, or triggers a false alert. AT&T is limited in this regard. I also don't see anything special about the mobile hotspot feature that allows AT&T more access to information that it did not have previously. See the rest of my post.
If people aren't being careful about what they are doing online while tethered (for example, they are doing things their iPhones cannot do natively), it's pretty simple for AT&T to see that kind of activity. But someone who is smart about it can probably get by indefinitely.
I think AT&T is starting to panicking about the people who are leaving to go to Verizon. They need to make sure they are milking every dime they can get out of the iPhone users they still have
You missed the point of what I said in my post. For one - I explained why they may have waited. Pretty clearly.
I'm guessing a lot of people here are pissing and moaning about something that hasn't even affected them (yet) and might not ever. Which is even sillier. It sounds like very few (if any) on this thread actually GOT the email/txt.
And to reiterate what I said several posts ago (but so few people read full threads...) that I don't agree with ATT charging twice for people on CAPPED plans. If you pay for 2 gigs - you should get 2 gigs - no matter what. It's finite.
But unlimited data is a different matter. And for those that can't understand or see the difference - there's little use in trying to explain it over and over. You don't get it.
SDAVE
Apr 13, 12:31 AM
Wrong forum to talk about users who use FCP professionally (ie. Angus Wall, etc. etc.)
Photics
Apr 9, 10:03 AM
Also...
I like the idea of being able to take 3D pictures with the Nintendo 3DS, but that's not worth $250 to me... not at such low resolutions and not when I use my iPhone 4 so much. I like Nintendo, but I don't think they're making good decisions to protect their future. Why don't they work more with independent developers? Why didn't they build their own app store for independent developers? Why not team up with Apple, like Sony sorta is doing with Android?
Nintendo did really well during the last few years. But now, Apple is becoming a threat. If you acknowledge the threat to Nintendo or not, that's irrelevant. Why? It's because Nintendo acknowledges the threat.
http://www.businessinsider.com/nintendo-execs-admit-apple-is-the-enemy-of-the-future-2010-5
I like the idea of being able to take 3D pictures with the Nintendo 3DS, but that's not worth $250 to me... not at such low resolutions and not when I use my iPhone 4 so much. I like Nintendo, but I don't think they're making good decisions to protect their future. Why don't they work more with independent developers? Why didn't they build their own app store for independent developers? Why not team up with Apple, like Sony sorta is doing with Android?
Nintendo did really well during the last few years. But now, Apple is becoming a threat. If you acknowledge the threat to Nintendo or not, that's irrelevant. Why? It's because Nintendo acknowledges the threat.
http://www.businessinsider.com/nintendo-execs-admit-apple-is-the-enemy-of-the-future-2010-5
Multimedia
Oct 26, 01:21 AM
MacOSX scales very poorly compared to (say) Linux, Irix, or AIX, owing to its Mach underpinnings. 8 cpus won't get you much over 4 until Apple rips out the Mach guts and replaces it.I don't believe you. I use applications that want 3-4 cores EACH. And I need to run 2-4 of them simultaneously. No way is Apple going to ship dual Clovertowns if they provide no benefit. I think AppliedVisual also does not believe you. In other words:
You may be mistaken.
You may be mistaken.
Speedy2
Oct 7, 04:17 PM
No, they most likely wouldn't. There is no reason to think that it would - it's conjecture. (http://daringfireball.net/2004/08/parlay)
Have you actually READ the link you posted?
Times have changed a bit since then, you know ...
Due to Apple's grown popularity (if not ubiquity) it can be safely assumed that quite a few more people would install Mac OS if it were officially supported on non-Mac hardware. A highly significant number of people? Good question. To Apple's benefit? Probably not.
Have you actually READ the link you posted?
Times have changed a bit since then, you know ...
Due to Apple's grown popularity (if not ubiquity) it can be safely assumed that quite a few more people would install Mac OS if it were officially supported on non-Mac hardware. A highly significant number of people? Good question. To Apple's benefit? Probably not.
Panther
Mar 18, 02:26 PM
Note: This application has been untested by this site, and Apple will likely take steps to prevent future usage.iTMS just used web service interfaces and XML over HTTP... It will be interesting to see just how they could stop an app from accessing.
What is more likely is that the iTMS servers would add in the DRM and buyer metadata before it gets downloaded. Its actually a little shocking that it wasn't designed to do that in the first place!
What is more likely is that the iTMS servers would add in the DRM and buyer metadata before it gets downloaded. Its actually a little shocking that it wasn't designed to do that in the first place!
DeathChill
Apr 21, 07:53 AM
Ouch, it must really have hurt Apple that Android *smartphones* outsold all Apple iOS *devices* worldwide in Q1 (40 million Android smartphones compared to 32 million iOS devices). So they now are making again strange comparisons that only cover *one* market and *phones* vs. *devices.
Any links for that claim?
Also, Apple doesn't make the charts; I don't get how it's strange to compare a platform to another platform. I think it's stranger to compare a single device to an entire platform.
Any links for that claim?
Also, Apple doesn't make the charts; I don't get how it's strange to compare a platform to another platform. I think it's stranger to compare a single device to an entire platform.
DeathChill
Apr 20, 08:53 PM
Also try physical keyboards, NFC, OLED screens, WiMax etc. As far as making it through the day is concerned, I can show you how to drain iPhone's battery in 6 hours. What's your point? Use LTE when you need it.
Just curious what NFC does in any Android device currently?
Of course you can work hard to drain the phones battery but LTE is draining the phones battery without trying. Nothing wrong with that, but Apple focuses on a single model and they have a set of requirements that they wish to achieve (battery life being awesome is one of them!).
If you don't like it, don't buy it, I guess?
Just curious what NFC does in any Android device currently?
Of course you can work hard to drain the phones battery but LTE is draining the phones battery without trying. Nothing wrong with that, but Apple focuses on a single model and they have a set of requirements that they wish to achieve (battery life being awesome is one of them!).
If you don't like it, don't buy it, I guess?
Silentwave
Sep 25, 11:41 PM
I'd pay for them to try and do a low voltage Clovertown like they did Woodcrest with the 5148LV. That one had a TDP not far off of Merom.
aristobrat
Mar 18, 12:33 PM
I'm going to tether til they change my plan, and when they do, cancel with no ETF, and use the money I would have spent paying the ETF on clear spot 4g+.
Really? There's an active lawsuit against Clear for throttling the speed of the high-bandwidth users on some of Clear's unlimited plans. Oh, and their CEO just quit. Switch with confidence!
I smell a lawsuit against AT&T coming along!
Maybe.
T-Mobile and Verizon have both (in previous years) goine after people tethering on plans that don't include tethering. No lawsuits.
Here's what happens: the carrier cracks down, the blogosphere publicizes that the carriers are doing it, forums have threads like this, and after a few weeks, the commotion dies down and people pick the appropriate data plans.
The weird thing was that with unauthorized tethering on T-Mobile and Verizon, how to do it wasn't really mainstream info. Some folks figured it out, and they'd post on forums like howardforum, but it's nothing like how info about MyWi/iPhone is pretty much virtually everywhere nowadays.
Really? There's an active lawsuit against Clear for throttling the speed of the high-bandwidth users on some of Clear's unlimited plans. Oh, and their CEO just quit. Switch with confidence!
I smell a lawsuit against AT&T coming along!
Maybe.
T-Mobile and Verizon have both (in previous years) goine after people tethering on plans that don't include tethering. No lawsuits.
Here's what happens: the carrier cracks down, the blogosphere publicizes that the carriers are doing it, forums have threads like this, and after a few weeks, the commotion dies down and people pick the appropriate data plans.
The weird thing was that with unauthorized tethering on T-Mobile and Verizon, how to do it wasn't really mainstream info. Some folks figured it out, and they'd post on forums like howardforum, but it's nothing like how info about MyWi/iPhone is pretty much virtually everywhere nowadays.
DUSTmurph
Oct 7, 05:04 PM
The cell phone market is so sporadic its hard to predict numbers for 1 year in the future, let alone 2 years.
bugfaceuk
Apr 9, 09:38 AM
I see lots of opinion here, but not a lot of facts. While there are some retro packs, where is a collection of 25 games � less than a year old � for the Nintendo DS?
Here's more like reality...
Bookworm... $20 on the Nintendo DS, but 99�-$2.99 on iPhone.
Before you point out the mote in our eyes, remove the plank from your own. What is the claim that Nintendo will go the way of Blockbuster other than opinion?
The plethora of mini-game based Wii games is a fact. The fact that those specific titles have not been ported to iOS (although I suspect that if I looked I'd find facsimiles of all languishing as failed $.99 games) does not invalidate the point.
Here's more like reality...
Bookworm... $20 on the Nintendo DS, but 99�-$2.99 on iPhone.
Before you point out the mote in our eyes, remove the plank from your own. What is the claim that Nintendo will go the way of Blockbuster other than opinion?
The plethora of mini-game based Wii games is a fact. The fact that those specific titles have not been ported to iOS (although I suspect that if I looked I'd find facsimiles of all languishing as failed $.99 games) does not invalidate the point.
HecubusPro
Sep 12, 06:38 PM
Anyone got a screenshot from the keynote?
What do you mean? That's a picture from the keynote this morning posted by one of the Gizmodo guys who was there.
What do you mean? That's a picture from the keynote this morning posted by one of the Gizmodo guys who was there.
acearchie
Apr 13, 05:14 AM
Some of those questions actually were answered (for example that full keyboard control has been retained) and others are more or less no-brainers (like the stabilization question - you can enable/disable and even fine-tune that even in the dumbed-down iMovie, so why shouldn't you be able to do that in Final Cut).
Does that mean that all the features will be retained then since if I can currently operate a tool from my keyboard in FCP7 then surely that same tool will be available in FCPX.
On a side note Lethal wanted to know whether the keyboard was programmable not if it was the same layout.
Full keynote has been uploaded to YouTube -
Part 1: http://www.youtube.com/watch?v=8VLwsfBa71U
2: http://www.youtube.com/watch?v=HfgnyRSRyzg
3: http://www.youtube.com/watch?v=M3OI3RGdhrM
4: http://www.youtube.com/watch?v=M16Hb4_3oOY
Hmmm could have been positioned better personally but it�s better than nothing!
Does that mean that all the features will be retained then since if I can currently operate a tool from my keyboard in FCP7 then surely that same tool will be available in FCPX.
On a side note Lethal wanted to know whether the keyboard was programmable not if it was the same layout.
Full keynote has been uploaded to YouTube -
Part 1: http://www.youtube.com/watch?v=8VLwsfBa71U
2: http://www.youtube.com/watch?v=HfgnyRSRyzg
3: http://www.youtube.com/watch?v=M3OI3RGdhrM
4: http://www.youtube.com/watch?v=M16Hb4_3oOY
Hmmm could have been positioned better personally but it�s better than nothing!
chrono1081
Apr 20, 09:31 PM
I honestly have no idea how you have the job that you do, because you fail tremendously in this aspect.
I have the job that I do because I know MUCH more about Windows than you do obviously. If you think what I posted above is a bunch of fud then you really don't know anything about Windows OS or manual malware removal. There is all kinds of ways malware can hide and on Windows many times the only way you know its on the system is by finding altered registry keys, but removing the key doesn't remove the malware so you have to manually dig for files. Most of the time you can find them by looking but some malware uses the feature to hide folders completely even if you tell the system to show all files. If you want a prime example of a virus that does this look up and infect your system with Oboma (yes its spelled incorrectly). It went around our workplace all the time and most of the time it used the file hiding technique mentioned above. Another is WD32Silly (or something close to that). Thats another one that always did it. With over 6,000 users to support I see this stuff all the time.
EDIT: This is why tools that access files outside the OS are popular, like BartPE and various other packages. You can see these files if Windows is not booted up and your not plugging the drive into another machine.
Why do they allow the files to be hidden?
Of course if you used Norton you wouldn't have this problem. :D:D:D
Actually....we use Symantec which is the the first scanner we use which doesn't find anything ;) Or, to its credit it will find something, but not remove it (hence how we find out the names half of the time). Honestly though you really want multi-layered scanning. If the program on the computer doesn't catch anything it goes to IT and we scan it with other tools, as a last resort we will manually remove it but if it doesn't work or ends up being to "messy" the machine gets re-imaged.
I have the job that I do because I know MUCH more about Windows than you do obviously. If you think what I posted above is a bunch of fud then you really don't know anything about Windows OS or manual malware removal. There is all kinds of ways malware can hide and on Windows many times the only way you know its on the system is by finding altered registry keys, but removing the key doesn't remove the malware so you have to manually dig for files. Most of the time you can find them by looking but some malware uses the feature to hide folders completely even if you tell the system to show all files. If you want a prime example of a virus that does this look up and infect your system with Oboma (yes its spelled incorrectly). It went around our workplace all the time and most of the time it used the file hiding technique mentioned above. Another is WD32Silly (or something close to that). Thats another one that always did it. With over 6,000 users to support I see this stuff all the time.
EDIT: This is why tools that access files outside the OS are popular, like BartPE and various other packages. You can see these files if Windows is not booted up and your not plugging the drive into another machine.
Why do they allow the files to be hidden?
Of course if you used Norton you wouldn't have this problem. :D:D:D
Actually....we use Symantec which is the the first scanner we use which doesn't find anything ;) Or, to its credit it will find something, but not remove it (hence how we find out the names half of the time). Honestly though you really want multi-layered scanning. If the program on the computer doesn't catch anything it goes to IT and we scan it with other tools, as a last resort we will manually remove it but if it doesn't work or ends up being to "messy" the machine gets re-imaged.
OllyW
Apr 21, 07:06 AM
I struggle with the LTE angle mainly due to the fact in the UK we haven't even got visual voicemail working on the iPhone 4
Speak for yourself, it works on mine. :p
Speak for yourself, it works on mine. :p
cr2sh
Oct 7, 12:16 PM
I thought we decided to ignore everything that barefeats has to say? They are not a reputable source at all, their tests are flawed and they have little metadata at all.... why even bother?
shyataroo
Oct 12, 02:51 PM
I say screw the 8 core intel...lets get a dual-8 core G5 @ 4.2Ghz! with a seperate processor that dictates what operations goto what core to prevent the need for inter-processor communication! oh and make it a 128 bit processor with a built in Nvidia 7950 GX2 OC have it cooled by liquid nitrogen and have 1TB of DDR4 Quad-Channel Ram!
wordoflife
Mar 13, 01:48 AM
I hope the best for Japan. The pictures and videos are very horrifying and saddening.
logandzwon
May 2, 10:37 AM
Is your info from like 1993 ? Because this little known version of Windows dubbed "New Technology" or NT for short brought along something called the NTFS (New Technology File System) that has... *drumroll* ACLs and strict permissions with inheritance...
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
While I generally agree with whqt your saying, most XP machines I've seen the primary account the owner uses is an Administrator account that allows any application full access to anything on the machine. Very few unix types do that.
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
While I generally agree with whqt your saying, most XP machines I've seen the primary account the owner uses is an Administrator account that allows any application full access to anything on the machine. Very few unix types do that.
lilo777
Apr 20, 09:22 PM
So wait, you don't own a Mac or an iDevice but you post here constantly?
Is that a prerequisite? I have Apple battery charger.
Is that a prerequisite? I have Apple battery charger.
yg17
Mar 18, 03:02 PM
DRM= digital rights management= copy protection
I'm also quite surprised that Apple DRMs the songs as they are downloaded. All it takes is a hack into the servers housing the music and there goes the neighborhood.
The music has to be stored un-DRMed which is a huge risk for the iTMS or Napster or any other online store. The difference is when it gets the DRM added to it. If it gets the DRM at the server before its sent out for download, then this will solve the problem. But either way, the music has to be stored without any DRM somewhere and hacking into the servers would indeed be trouble
I'm also quite surprised that Apple DRMs the songs as they are downloaded. All it takes is a hack into the servers housing the music and there goes the neighborhood.
The music has to be stored un-DRMed which is a huge risk for the iTMS or Napster or any other online store. The difference is when it gets the DRM added to it. If it gets the DRM at the server before its sent out for download, then this will solve the problem. But either way, the music has to be stored without any DRM somewhere and hacking into the servers would indeed be trouble
skunk
Apr 27, 09:21 AM
A slight correction: you either believe in the Biblical God and that the Bible is divinely inspired or you believe neither.
You can believe there is a God without believing the Judeo/Christian folklore.
Exactly what I was going to say.
<high five>
You can believe there is a God without believing the Judeo/Christian folklore.
Exactly what I was going to say.
<high five>
AidenShaw
Oct 29, 11:48 AM
No. All will work on Clovertown that worked on Woodcrest.
In theory you're correct, Multimedia.
In practice, it is possible that a multi-threaded program might have synchronization or logic bugs that don't show up with 4 CPUs, but do show up with 8 CPUs. For example:
Thread_ID tid[4];
for (i=0; i<System.CPU_count(); i++)
{
Reacent Post
In theory you're correct, Multimedia.
In practice, it is possible that a multi-threaded program might have synchronization or logic bugs that don't show up with 4 CPUs, but do show up with 8 CPUs. For example:
Thread_ID tid[4];
for (i=0; i<System.CPU_count(); i++)
{
0 comments:
Post a Comment