Welcome to Mac OS X 2 Installing Mac OS X
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Apple Software Design Guidelines
Apple Software Design Guidelines May 27, 2004 Java and all Java-based trademarks are Apple Computer, Inc. trademarks or registered trademarks of Sun © 2004 Apple Computer, Inc. Microsystems, Inc. in the U.S. and other All rights reserved. countries. OpenGL is a trademark of Silicon Graphics, No part of this publication may be Inc. reproduced, stored in a retrieval system, or transmitted, in any form or by any means, PowerPC and and the PowerPC logo are mechanical, electronic, photocopying, trademarks of International Business recording, or otherwise, without prior Machines Corporation, used under license written permission of Apple Computer, Inc., therefrom. with the following exceptions: Any person Simultaneously published in the United is hereby authorized to store documentation States and Canada. on a single computer for personal use only Even though Apple has reviewed this manual, and to print copies of documentation for APPLE MAKES NO WARRANTY OR personal use provided that the REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH RESPECT TO THIS MANUAL, documentation contains Apple's copyright ITS QUALITY, ACCURACY, notice. MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE. AS A RESULT, THIS The Apple logo is a trademark of Apple MANUAL IS SOLD ªAS IS,º AND YOU, THE PURCHASER, ARE ASSUMING THE ENTIRE Computer, Inc. RISK AS TO ITS QUALITY AND ACCURACY. Use of the ªkeyboardº Apple logo IN NO EVENT WILL APPLE BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, (Option-Shift-K) for commercial purposes OR CONSEQUENTIAL DAMAGES without the prior written consent of Apple RESULTING FROM ANY DEFECT OR may constitute trademark infringement and INACCURACY IN THIS MANUAL, even if advised of the possibility of such damages. -
Macintoshed Libraries 2.0. INSTITUTION Apple Library Users Group, Cupertino, CA
DOCUMENT RESUME ED 355 947 IR 054 450 AUTHOR Vaccaro, Bill, Ed.; Valauskas, Edward J., Ed. TITLE Macintoshed Libraries 2.0. INSTITUTION Apple Library Users Group, Cupertino, CA. PUB DATE 89 NOTE 96p.; For the 1991 volume, see IR 054 451. PUB TYPE Collected Works General (020) Reports - Descriptive (141) EDRS PRICE MF01/PC04 Plus Postage. DESCRIPTORS Academic Libraries; *Computer Software; Elementary Secondary Education; Higher Education; *Hypermedia; *Library Automation; Library Instruction; Library Services; *Microcomputers; Public Libraries; Reference Services; School Libraries IDENTIFIERS *Apple Macintosh; HyperCard; Screen Format; Vendors ABSTRACT This annual collection contains 18 papers about the use of Macintosh computers in libraries. Papers include: "The Macintosh as a Wayfinding Tool for Professional Conferences: The LITA '88 HyperCard Stack" (Ann F. Bevilacqua); "Enhancing Library Services with the Macintosh" (Naomi C. Broering); "Scanning Technologies in Libraries" (Steve Cisler); "The Macintosh at the University of Illinois at Chicago Library: Flexibility in a Dynamic Environment" (Kerry L. Cochrane); "How a School Librarian Looked at a Gnawing Problem (and Saw How the Mac and Hypercard Might Solve It)" (Stephen J. D'Elia); "The Macintoshed Media Catalog: Helping People Find What They Need in Spite of LC" (Virginia Gilmore and Layne Nordgren); "The Mac and Power Days at Milne" (Richard D. Johnson); "The USC College Library--A Macintoshed System" (Anne Lynch and Hazel Lord); "Macintosh in the Apple Library: An Update" (Rosanne Macek); "The Macs-imized High School Library Instructional Program" (Carole Martinez and Ruth Windmiller); "The Power To Be Our Best: The Macintosh at the Niles Public Library" (Duncan J. McKenzie); "Taking the Plunge...or, How to Launch a 'Mac-Attack' on a Public Library" (Vickie L. -
Mac OS 8 Update
K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS. -
Device Manager 1
CHAPTER 1 Device Manager 1 This chapter describes how your application can use the Device Manager to transfer information into and out of a Macintosh computer. The Device Manager controls the 1 exchange of information between applications and hardware devices. Manager Device This chapter provides a brief introduction to devices and device drivers (the programs that control devices) and then explains how you can use the Device Manager functions to ■ open, close, and exchange information with device drivers ■ write your own device driver that can communicate with the Device Manager ■ provide a user interface for your device driver by making it a Chooser extension or desk accessory. You should read the sections “About the Device Manager” and “Using the Device Manager” if your application needs to use the Device Manager to communicate with a device driver. Applications often communicate with the Device Manager indirectly, by calling functions of other managers (for example, the File Manager) that use the Device Manager. However, sometimes applications must call Device Manager functions directly. The sections “Writing a Device Driver,” “Writing a Chooser-Compatible Device Driver,” and “Writing a Desk Accessory,” provide information you’ll need if you are writing your own device driver. If you writing a device driver, you should understand how memory is organized and allocated in Macintosh computers. See Inside Macintosh: Memory, for this information. You should also be familiar with resources and how the system searches resource files. You can find this information in the chapter “Resource Manager” in Inside Macintosh: More Macintosh Toolbox. If your device driver is to perform background tasks, you’ll need to understand how processes are scheduled. -
Mac OS X Server Administrator's Guide
034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included -
WINDOWS® 8.1 in DEPTH Copyright © 2014 by Pearson Education, Inc
Windows® 8.1 Brian Knittel Paul McFedries 800 East 96th Street Indianapolis, Indiana 46240 WINDOWS ® 8.1 IN DEPTH Copyright © 2014 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a Editor-in-Chief retrieval system, or transmitted by any means, electronic, mechanical, photo- Greg Wiegand copying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information con- Executive Editor tained herein. Although every precaution has been taken in the preparation of Rick Kughen this book, the publisher and author assume no responsibility for errors or omis- sions. Nor is any liability assumed for damages resulting from the use of the Development Editor information contained herein. Todd Brakke ISBN-13: 978-0-7897-5281-9 Managing Editor ISBN-10: 0-7897-5281-6 Sandra Schroeder Library of Congress Control Number: 2014930138 Printed in the United States of America Senior Project Editor Tonya Simpson First Printing: March 2014 Trademarks Copy Editor All terms mentioned in this book that are known to be trademarks or service Cheri Clark marks have been appropriately capitalized. Que Publishing cannot attest to the Senior Indexer accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Cheryl Lenser Windows is a registered trademark of Microsoft Corporation. Technical Editor Warning and Disclaimer Karen Weinstein Every effort has been made to make this book as complete and as accurate as Editorial Assistant possible, but no warranty or fitness is implied. -
Configuring for Wireless Ethernet: Mac OS X
Configuring for Wireless Ethernet: Mac OS X Step 1: Install the Airport Card Install your Airport card and software according to Apple’s directions. If the Airport Setup Assistant window appears, you can simply close it by clicking in the close box in the upper left corner of the window. You do not need to use the Airport Setup Assistant. IMPORTANT: Do NOT set up your Macintosh to be an Airport Software Base Station! Configure the Wireless Card Using Your Wireless Connection Step 2: Using Your Wireless Connection 1.Go to a location on campus where wireless networking is available. 2. Start up your computer and open Applications/Internet Connect. Select Airport from the configuration drop-down menu. (If necessary, turn your Airport card on by selecting Turn Airport On.) Then choose Lehman College from the Network drop-down menu. The length of the colored area in the Signal Level bar indicates the strength of your wireless connection. If you have low signal strength, you may want to move to another location to get better performance 3. Choose System Preferences from the Apple menu or click the System Preferences icon in the dock. Click the Network icon to display its options. • Set the Configure drop-down menu to Using DHCP. • Click Apply Now and then select Quit from the System Preferences menu. • Save the changes to your configuration when prompted. Now you can run a network software program such as Netscape Navigator. You should be able to connect to the Internet and browse the Web just as you would with a wired connection. -
Chapter 1. Origins of Mac OS X
1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years. -
Well Known TCP and UDP Ports Used by Apple Software Products
Well known TCP and UDP ports used by Apple Languages English software products Symptoms Learn more about TCP and UDP ports used by Apple products, such as OS X, OS X Server, Apple Remote Desktop, and iCloud. Many of these are referred to as "well known" industry standard ports. Resolution About this table The Service or Protocol Name column lists services registered with the Internet Assigned Numbers Authority (http://www.iana.org/), except where noted as "unregistered use." The names of Apple products that use these services or protocols appear in the Used By/Additional Information column. The RFC column lists the number of the Request For Comment document that defines the particular service or protocol, which may be used for reference. RFC documents are maintained by RFC Editor (http://www.rfc- editor.org/). If multiple RFCs define a protocol, there may only be one listed here. This article is updated periodically and contains information that is available at time of publication. This document is intended as a quick reference and should not be regarded as comprehensive. Apple products listed in the table are the most commonly used examples, not a comprehensive list. For more information, review the Notes below the table. Tip: Some services may use two or more ports. It is recommend that once you've found an instance of a product in this list, search on the name (Command-F) and then repeat (Command-G) to locate all occurrences of the product. For example, VPN service may use up to four diferent ports: 500, 1701, 1723, and 4500. -
Mac OS X: an Introduction for Support Providers
Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk. -
Introduction to IDL
Introduction to IDL Mark Piper, Ph.D. Barrett M Sather Exelis Visual Information Solutions Copyright © 2014 Exelis Visual Information Solutions. All Rights Reserved. IDL, ENVI and ENVI LiDAR are trademarks of Exelis, Inc. All other marks are property of their respective owners. The information contained in this document pertains to software products and services that are subject to the controls of the U.S. Export Administration Regulations (EAR). The recipient is responsible for ensuring compliance to all applicable U.S. Export Control laws and regulations. Version 2014-03-12 Contacting Us The Exelis VIS Educational Services Group offers a spectrum of standard courses for IDL and ENVI, ranging from courses designed for beginning users to those for experienced application developers. We can develop a course tailored to your needs with customized content, using your data. We teach classes monthly in our offices in Boulder, Colorado and Herndon, Virginia, as well as at various regional settings in the United States and around the world. We can come to you and teach a class at your work site. The Exelis VIS Professional Services Group offers consulting services. We have years of experience successfully providing custom solutions on time and within budget for a wide range of organizations with myriad needs and goals. If you would like more information about our services, or if you have difficulty using this manual or finding the course files, please contact us: Exelis Visual Information Solutions 4990 Pearl East Circle Boulder, CO 80301 USA +1-303-786-9900 +1-303-786-9909 (fax) www.exelisvis.com [email protected] Contents 1. -
Greensboro Public Library Computer Services
Greensboro Public Library Computer Services Wireless Internet Access Guidelines You are invited to explore the Internet using your own wireless enabled device at the Greensboro Public Library. Free internet access is provided at all Greensboro Public Library locations at all times the Library is open. Wireless internet access uses radio frequency signals to move information between your laptop computer and the internet (no cables are required.) This allows you to bring in your own mobile device, get Internet access and print from said device. It also allows the Library to offer more computer access than our existing floor space and wiring currently allows. Use your wireless device at any of the chairs and tables in the Library, rather than just at our normal public computer areas. Setup as: Network name (SSID) is Greensboro Public Library, no password is needed, WEP encryption is off. Limitations and Disclaimers • By using this free wireless service you agree to abide by the Library’s Agreement for Acceptable Computer Use Policy and the Public Library Wi-Fi Internet Access Policy. • Since all information moves over open radio frequencies the Library’s wireless network is NOT SECURE. Any information you enter or display, including e-mail, can potentially be captured by anyone with a wireless device and the appropriate software within several hundred feet. The Library strongly urges you not to enter passwords, PIN numbers, account numbers or other private information while using the wireless network, and cautions that using the wireless network for e-mail may allow other people to read your e- mail. Use VPN’s (Virtual Private Networks) and websites that employ encrypted (https) access if you absolutely must enter personal information, passwords, etc.