10 things that should be in Apple’s next Mac Pro

A lot of points they make do kinda conflict, asking for more for a lower price. However, there are a lot of good points. The points I agree on are ditching fireware for esata, and onboard raid controllers. October 12, 2007 (Computerworld) — The recent word from The Inquirer that Apple may be hoarding all of Intel’s new 45nm Penryn processors — and possibly paying for the privilege — has prompted a lot of speculation about the future of Apple’s Mac Pro desktop lineup. Apple’s professional machines, which now use Intel Xeon Cloverton chips topping out at 3 GHz, are called workstations by Apple and offer quad- and eight-core configurations. They’re fast, and they sport professional prices to match, with top-of-the-line eight-core units starting at $3,997. Read More

A lot of points they make do kinda conflict, asking for more for a lower price. However, there are a lot of good points. The points I agree on are ditching fireware for esata, and onboard raid controllers.

October 12, 2007 (Computerworld) — The recent word from The Inquirer that Apple may be hoarding all of Intel’s new 45nm Penryn processors — and possibly paying for the privilege — has prompted a lot of speculation about the future of Apple’s Mac Pro desktop lineup. Apple’s professional machines, which now use Intel Xeon Cloverton chips topping out at 3 GHz, are called workstations by Apple and offer quad- and eight-core configurations. They’re fast, and they sport professional prices to match, with top-of-the-line eight-core units starting at $3,997.

Read More


Did you like this article?


0 Shares:
You May Also Like

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]
Read More

Fiber Optic Table Illuminates Your Dining

Fiber Optic Table Illuminates Your Dining - Deepa writes "We highly doubt LumiGram's Luminous Fiber Optic Tablecloth was designed with power outages in mind, but why hook up a boring string of lamps or fiddle with half melted candles when you can plug this bad boy into the generator? The cloth, which has fiber optics woven throughout, cotton borders, and a Europlug mains adapter, proves most useful when the lights are dimmed, and should prove quite the centerpiece at your next get-together. The illuminating device is available in a trio of sizes, comes in a variety of color schemes."

Read more of this story at Slashdot.

[Slasdot]
Read More

Exim4 and PHP and PHP-CGI mail() function using incorrect From: and applying Sender: headers.

If you're using Exim4 and PHP as a module or as a CGI with suexec. You may have noticed some issues with your mail. Specifically you would have noticed that either the "From:" header was using "[email protected]" or "[email protected] name, its also possibly that you had an additional header called "Sender:". There are two things you need to do to fix this. You first need to make sure that your "php.ini" has the following value "sendmail_path = /usr/sbin/sendmail -t -i". Which is the default, double check this variable as it might be set to something else.
Read More