TMS and ipad jabber video telepresence licenses?

LIC-JAB-MOB-n

You must purchase licenses for mobile devices?

Currently, I have no license, but I'm on ipad

Thank you

Please see this thread

https://supportforums.Cisco.com/message/3736583#3736583

/Magnus

Tags: Cisco Support

Similar Questions

  • Jabber video for Ipad (former Movi) on the Appstore

    Hello

    Does anyone know why the video Jabber for Ipad (Movi for ipad) was removed from the appstore? I know customers who were trapped in the new Jabber for Ipad (with CUCM and IM & P), but still works on the old infrastructure VCS and TMS. So now their customer no longer works.

    Is this temporary like in the past with iOS 6 or is it standing like iOS 9 was released and the product is not supported on it?

    What was any communications from Cisco on removing of the AppStore. If Yes, could it link me a cause document or Web page, I can't find anything in the notes version or documents related to the former client.

    Thank you

    Cecile

    JabberVideo aka Movi is EOL/EOS so he would sooner or later, well, no, he's not back - take a look at this thread post and note by Patrick; https://supportforums.Cisco.com/discussion/12607856/i-cant-find-Jabber-video-Telepresence-AppleStore-iPad

    /Jens

    Please note the answers and score the questions as "answered" as appropriate.

  • Problem with directory of TMS to Jabber Video distribution

    Hello

    Recently, I have a problem with the configuration of the directories for video Jabber clients. Looked through a few topics that seem related but found them a little different.

    In short: TMS 13.2 configured Extension commissioning and off FindMe, VCS Expressway 7.2, Cisco Jabber client video v4.5.

    Steps performed:

    1. a new user has been created (inside Provisioning > users) with [email protected] / * / and Device_Address_Pattern =

    [email protected] / * /.

    2. this user got automatically in the Provisioning directory (which already had a few other contacts inside)

    3. I have connected the video Jabber client with the new account, but can not find all the users via the search field within the customer (TMS illustrates usage of licenses) put into service.

    It is easy to manually assign phone book on a device by using the function 'Set on systems. But what do I do to get his Jabber Client video inputs?

    Thanks in advance!

    Hi Alex

    In the management of directories if you click on a directory there are Access tab control that allows you to assign access to directories for users.

    Then you must make sure that you the directory server URI in the configuration of the user model commissioning as [email protected] / * / .

    Make sure then that the TMS and the VCS is synchronized, you should now be able to search for directories if everything is correct.

    / Magnus

  • Is Jabber Video for iPad EoL´d?

    I didn t has seen the announcement about the Jabber video for iPad has retired, but the app is more on the Apple Store.

    I can only find the new 10.5 Jabber, but this one Don t allows to register for the VCS + TMS.

    A tip how can we download the latest Cisco Jabber video app? or how to make the 10.5 to enroll in the VCS?

    Thank you

    A new version (9.3.9) is out this weekend - including iOS compatibility 8.

    https://iTunes.Apple.com/au/app/Cisco-Jabber-video-for-iPad/id540243083?Mt=8

    Wayne
    --
    Remember the frequency responses and mark your question as answered as appropriate.

  • Integration of Active Directory with telepresence - Jabber video

    Hello

    I would like to have a clarification on the integration of commercials with the existing infrastructure of TP.

    We have A VCS - C 8.x, VCS-E 7.2.2 14.3 TMS with TMSPE.

    We need to have our video Jabber users using their accounts and authentication of the user accounts existing on AD. All the other codecs authentication will be local VCS - c.

    Where can I configure the integration of ads?  The TMS only? VCS - C only? or both?

    Any document that clearly explain this configuration?

    Thank you.

    If you want to check the credentials on the control and Jabber clients video to send their requests for authentication to control VCS, where you have the setup of ADS, you must configure the default and traversal zones to check not the credentials on the highway.

    Regarding your comment on authentication to the highway, just to be clear, before the customer can actually create a record on the freeway, do you want to authenticate, meaning the subzone where they will register to check the credentials, if so, ADS a problem here.  As the video Jabber client will always use NTLM to send its credentials when ADS is used, the highway will be presented with the username/password user name field.  As the highway is not connected to the announcement of check these credentials, it will not allow recording.  Authentication of registration requests always happens on the local server, because that's where the record should be.

    Zac in the discussion below, covers this very well and how to get around it when using ADS and video recording Jabber to Hwy.

    Jabber-video-authentication-vcs-what

  • Integration of video telepresence, Cisco Jabber

    Hello

    How are you?

    I have a question, can Cisco Jabber video join a standalone VCS? or is it also a TMS? on his page it is said that a requirement is the MSDS, but if a customer has a VCS with TP EP registered him, he wants to allow video jabber as well on the network and wants to know if it can be done without the need to obtain an MSDS.

    can someone help me?

    Please

    Sincerely,

    Dante Verastegui

    For a demonstration of the concept starter pack a VCS may be feasible, but if you start with

    CTS systems, I would say it is a nogo

    You use CUCM for CTS systems, have the VCS - C for your internal network where

    JabberVideo and MX200 can register and then the VCS-E for external/b2b communication and

    Maybe external registration + TMS to manage.

    The requirement for growth of each message, I suggest you really join Cisco (partner). :-)

    Please note the messages using the stars below!

  • Jabber video for telepresence directory

    Hi all

    I have a new directory and want to add it to the video of Jabber users.

    I'm new to TMS and I want to know how to add the directory in the jabber.

    I'm able to add the new directory to other units, but I want to know the process of adding new users video directory Jabber

    Any help is very appreciated.

    Thank you!

    Hi friend

    When you add a directory to your systems, you use the option 'set on systems' within the page of the phone book. But to apply the phonebook to jabber, it's different. Follow this:

    1. Access directories > Manager directories
    2. Select the directory that you want to apply for jabber clients
    3. Go to the tab "access control." Select the directory of jabber you want to query this directory

    That's all.

    I'm assuming your TMS provisioning directory and your SCVS are already configured correctly for jabber

    telephone directory works properly.

    Concerning

    Paulo Souza

  • TMS Provisioning Extension required for Jabber Video

    All,

    I'd check that commissioning Extension is not required for TMS (14.x) allow video exterenal Jabber users to participate in a video conference on a microcontroller.  These will be not registered in VCS video external Jabber users.

    Thank you

    John

    I guess video Jabber users will be registered to someone else is VCS or using the free video by Cisco Jabber service?  If so, that Yes, you don't need TMSPE, it is only necessary if YOU are commissioning and providing video Jabber service to others.

  • For TMS Win2008 Server and SQL Server client access licenses?

    Where, I read that the TMSXE interface requires a CAL on the Exchange Server.  What I can't seem to locate is all information about client access licenses how are required to Win2008 R2 Server Standard Edition and SQL Server 2008 R2 Standard.  Is there a reference document that I'm missing with this information.  It seems that according to Microsofts definitions, you might need a CAL by user device and/or managed web that connects to the web interface.

    Can someone clarify the situation?

    Hello world

    So should put the closure of this thread, I have now clarified what follows when it comes to TMS and MS licenses:

    Users and administrators to connect to TMS authenticate AD, the server that hosts the TMS must be allowed to support authenticated connections. Don't authenticate TMS Managed/configure with AD devices via the web server. As a result, and as managed devices does not authenticate against IIS with AD login, these types of connections don't require licenses. Only users who connect to the Web site would be.

    The issue of Exchange and SQL are similar, that is, authenticated connections how are made?

    Of MSDS, all connections to SQL server use the same authenticated account, by default uses a SQL login.  Web site users are not authenticated to SQL Server. Therefore, and in the case of an external SQL Server, this would be equal to one.

    When communicating with Exchange, all connections are through a unique service account. Created for managed systems the mailboxes are not connected by users or MSDS for normal operation. As a result, and as with an external SQL Server, this would be also equal to one.

    Hope that clarifies completely now

    Rgds,

    Dale

  • Question TMS and conductor - conferences to improve safety by using conference

    Hi people,

    Currently, I implement some projects involving Cisco Telepresence conductor and I was wondering the benefits that conductor brings to the video network, it's really a great solution!

    Discover the benefits of the conductor, I created the following deployment:

    It works very well! The customer is very satisfied with the level of security when using this deployment. Their multi-point conferences is safer now.

    Well, when I created this topology I considered not how the environment would work when planning conferences, with TMS and conductor because this client has yet to TMS. Then, I was just shocked when I opened the TMS deployment guide e conductor and find the following statement:

    Note: The exposed conductor TelePresence conference type is not supported in Cisco TMS. Only models conference using the conference meeting type are supported.

    Page 13 - http://www.cisco.com/en/US/docs/telepresence/infrastructure/tms/config_guide/TelePresence_Conductor_with_Cisco_TMS_Deployment_Guide_XC1-2_TMS14-1.pdf

    I almost jumped the bridge... Now, I know that my great topology no longer works with TMS.

    Well, here are my questions:

    Why do we have this limit?

    That Cisco plans to fix this?

    The guide is related to the conductor XC1-2 and 14-1 TMS, something has changed in TMS 14.2.2 and XC2.1?

    I'd appreciate any help really, really!

    Thanks in advance.

    Paulo Souza

    Please note the answers and mark it as "answered" as appropriate.

    Paulo Souza wrote:

    [...] I am wondered the benefits that Conductor brings to the video network, it is really a great solution!

    Agreed! The driver of the telepresence really is a great product.

    Why do we have this limitation?

    Because the feature was never implemented on the side TMS. It was decided that the other characteristics are more important and should be a priority. There is nothing on the type of conference 'Read' which is inherently incompatible with the TMS, but work needs to be done first.

    Examples:

    • The control of conference centre: you will probably see the entries in double Conference if you are using a 'read' conference
    • TMS does not differentiate between the presidents and guests during the creation of scheduled conferences 'Conference' on the conductor.

    None of them are very difficult to solve from a development point of view, but they are not trivial to apply or test either.

    Does Cisco have plans to fix that?

    Nothing specific is planned, don't. As always: if it is a problem to your customer, make a request to feature through your account manager or another Cisco point of contact.

    The guide is related to Conductor XC1-2 and TMS 14-1, has any thing been changed  in TMS 14.2.2 and XC2.1?

    Conductor XC 2.1 and TMS 14.2.2 is a combination not supported, but nothing has been changed to

    2.2 XC and 14.3 TMS: types of conference 'Read' are not yet supported.

    Best regards

    Kjetil

  • Jabber for telepresence (MAC OS)

    I was asked to rollouot the Jabber telepresence (MAC OS). I took all the Jabber for telepresence (Windows) However, I'm not familiar with the version of MAC OS.

    I looked for MAC OS user's guide, however it does not show where to enter the settings for the internal and external parameters.

    If someone has installed the version of MAC OS before and are there special models which must be addedd inot models in MSDS

    If you are looking to create a preconfigured installation program, see here:

    http://www.Cisco.com/en/us/docs/Telepresence/endpoint/Jabber_Video/4_6/CJAB_BK_C89F6C9E_00_cisco-Jabber-video-for-telepresence_chapter_011.html#CJAB_TK_CB861748_00

    The settings are in the relevant plist, look for com.cisco.JabberVideo.plist located in Library\Preferences.

    Parameters can also be added locally by the user; Open JabberVideo and click the key/screwdriver icon or choose JabberVideo then Preferences from the top Ribbon.

    Otherwise, there is no model of special supply required for the Mac, the two Win version and Mac use the same provisioning models.

    /Jens

    Please note the answers and score the questions as "answered" as appropriate.

  • iMessage didn't activate account iCloud on Mini, ok on iPhone and iPad

    To from the topic March 7, 2016 (approximate, not exact date), unable to activate iCloud account on iMessage (version 9.2) on a Mac Mini, OS 10.11.3.  He has worked well with iCloud account active prior to this date.  Since the update OS 10.11.4 and problem persists. During an attempt to "activate" iCloud account in Messages, I asks me to connect with my Apple ID.  The name is displayed correctly, the password was entered correctly, then the password appears to be being accepted, the icon of iMessage in "accounts" screen turned on continuously for about 15 seconds, then a message: "could not sign on iMessage.  An error occurred during activation.  Try Again. "On the Panel to the screen in red, is a message"an error has occurred during authentication. "Messages has 3 other accounts currently activated;  using Jabber, Google Talk and Hello.

    Action taken:

    • I changed the name of the Apple ID account on all 3 devices, disconnected and signed again.  iPhone and iPad work very well and are synchronized;  iCloud on the Mini works for calendar and Contacts, but not Messages.
    • In the Messages, I turned off accounts Jabber, Google Talk, Hello and tried to activate iCloud, failed, same result.
    • I've disabled and turned off the Messages on iPhone and iPad, restarted both devices, turned on and Messages helped once again, with the same result, no resolution.
    • I've updated the operating system on the Mini to the most recent 10.11.4, restarted and no resolution.  Calendar and Contacts are synchronized between Mini, iPhone, iPad, but not Messages.

    Any suggestions?

    During the processing of registration error messages-

  • Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • My new Apple TV v4 does not smoothly on Airplay with my MacbookPro and Air laptops but with the iPhone and iPad Airlay gets so juddery and then goes off - laptop computer WiFi connections all that happens on clues?

    Devastated to find that the new AppleTV works great on Airplay / mirroring with the iPhone and iPad devices but completely useless on the NEW laptops.

    Trying to show any video for example utube creates immediately hop on the TV screen when you use the Macbook and in no time the WiFi connection is stunned.

    What is going on?

    I use ElCapitan, and the last 15 "16GB i7 Macbook MacbookPro and not expect a problem with streaming media.

    Absolutely well on Airplay with bith an iPhone 6 Plus and also an Air iPad

    This will be due to a network problem. There is a difference between mirroring of a phone/Tablet and grow to a full desktop in real-time

    Mmake that there is no other activity (other streaming, web browsing, backup network etc.)

    Try to connect the Apple TV via ethernet

    To see a current state of the network to obtain a report of istumbler or similar. Look for the strength of the signal, noise, networks nearby

    Test on another network

  • TMS and SQL 2008 R2

    Hi all

    We plan to spend our SQL 2005 a 2008R2 server. In the Installation of TMS and Quick Start Guide (http://www.cisco.com/en/US/docs/telepresence/infrastructure/tms/install_guide/Cisco_TMS_Install_Getting_Started_Guide_13-1.pdf , page 6), they say that all versions of SQL 2008 are supported, but we must be sure that this includes the SQL 2008R2. Are there restrictions or considerations?

    Thank you!

    I seem to TMS doesn't run well with SQL 2008 R2 no problem

Maybe you are looking for

  • Microsoft Word and Outlook crashing

    I'm pretty certain 6 months after my conversion from Windows to Mac the Mac has been oversold a bit.  I expect things more to "work".  Maybe they do.  But the things that I use, including Outlook, Word and Powerpoint often do not work.  They hang.  T

  • HOW to make NI6537 work 2.5 v voltage level

    Hi all I just check on the datasheet of NI6537, it shows this work card to 2.5V 3.3V kinds of digital output voltage levels. But the default setting is 3, 3V. So, how do we define to 2.5 v (to the digital output) (using C++). I had once a function: I

  • HP envy: support from 110 to 220 volts

    I bought a hp envy phoneix 810 pc in the United States and must contribute to Europe.  Pls answer the following questions: 1. feeding sense auto tension? 2 pc usable on 110 volts or 220 volts? 3 supports 220V / 50 Hz Thank you D

  • Change key wireless connection security

    I want to change the security key for an easier to remember the connection to my wifi. Can someone help me.

  • the response has been directly on the spot thank you!

    My problem was with scams and virus people telling me that my computer was dated and full of infections in the registry after windows up date of the it and the help I got in my email was right!  I voted for her too! but I realized my computer is not