Feeds

Mac OS X Tiger out, Leopard back in

Upgrade follows downgrade follows upgrade

Gartner critical capabilities for enterprise endpoint backup

I couldn’t resist. I went back to Leopard. I’ve been running Apple’s latest operating system for well over a month now, originally 10.5.1 and now 10.5.2, with no untoward effects.

This wasn’t always the case. In a past post, I explained why mysterious Spotlight crashes had forced me to downgrade to Tiger. But I found myself missing Leopard’s slicker user interface. And with so many software developers now releasing Leopard-specific versions of their apps, it was clear I was at a turning point: to stay with ‘old’ Mac OS X and an ever-dwindling array of compatible third-party apps, or to try and make Leopard work for me.

Leopard Finder windows

The iTunes-like Finder I like

With 10.5.2 on the horizon, I chose the latter.

Thinking about the issues I’d had the first time round, I made the assumption that my problems were probably more a result of incompatible third-party apps than Apple’s own code. So I decided to ditch all those without Leopard-compatible versions. So, out went Microsoft Office, Adobe Photoshop CS and InDesign CS and a couple of utilities.

As before, I backed up my data, wiped my MacBook Pro’s hard drive, installed Leopard afresh, allowed it to update to 10.5.1 by download, and then put all my data back. Finally, I reinstalled all the apps and utilities I’d been using before — BareBones’ TextWrangler, Elgato’s Turbo264 and EyeTV, Adium, Rogue Amoeba’s Audio Hijack, MPEG Streamclip and others — this time ensuring I had the very latest versions.

Leopard Dock grid settings

Curves

I had a copy of Apple’s iWork kicking around, so I installed that too to provide Office-compatibilty. Its Keynote, Pages and Numbers apps are more than capable of reading, respectively, PowerPoint, Word and Excel files and writing them too. If you’re a heavy duty Office user, you may not find them acceptible substitutes, but they allow me to send and receive budget spreadsheets and to read the various .doc and .ppt files I get sent by companies’ PR agents.

All my writing’s done in a text editor, TextWrangler, so I haven’t used Word in earnest for ages.

Boost IT visibility and business value

More from The Register

next story
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.