Feeds

Windows on Mac: BootCamp vs Parallels Desktop

How to run the 'other' operating system...

High performance access to file storage

BootCamp

Apple's BootCamp software doesn't work the same way as Parallels Desktop. While Parallels lets you flip in and out of the guest operating system at will, BootCamp forces you to start up in Windows XP or Mac OS X. Want to switch back? Then restart again and select your original OS.

The upside is that Windows gets full access to the system's resources, so there's no performance hit, and you're free to install vendor-provided drivers for the GPU and so on. Forcing a restart means each OS runs more cleanly - there's no intermediate code juggling access to resources. All your memory is devoted to each OS, so there's no need to worry about making sure each gets sufficient to do what it needs to do.

The price you pay for that is the need to tweak the partitioning of your hard drive and the risk of data loss that, however small, this process invites. And since BootCamp won't be finalised until Mac OS X 10.5 ships, you'll be running pre-release test software, so you're open to whatever bugs Apple's developers have yet to fix. If something does go wrong, you're on your own. As I mentioned before, BootCamp also officially limits you to Windows XP.

windows on mac - bootcamp installation

But nothing ventured, nothing gained, so into the melee I dived. Tweaking hard drives is always a scary process, so make sure you back up all your data first. Reports from folk who've tried it already suggest that it's a good idea to verify your hard drive and repair file-access permissions before running BootCamp. Both tasks can be achieved by running Mac OS X's own Disk Utility, ideally by booting from a Mac OS X installer CD or DVD first. I also left the machine running unused for half an hour or so to allow the OS' auto-defragmentation code to do its stuff.

You'll also need to make sure you're running Mac OS X 10.4.6 at least, and that you have the latest firmware installed. Software Update may not show it, but you can download the updater from Apple's support website.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.