Feeds

Cube Clones Continue

Linux box apes Apple

  • alert
  • submit to reddit

Now this is a machine that's really going to get Apple's legal department rubbing their hands in glee. Taiwan-based DA Computing launched its Komodo Server at Comdex this week, and if it's not a Power Mac G4 Cube rip-off, we're Steve Jobs uncle.

Komodo pic over at MacNN.com

Komodo, it transpires, is a small office server, designed to provide LAN-connected users with a single point of access to the Net. The box operates as Web, FTP, fax, DNS, DHCP and email server, according to MacNN, which first spotted the thing.

And cheeky DA Computing - unlike previous Mac cloners - cheerfully admits there is a similarity: "[Komodo Server] was gifted with a beautiful out-looking, the cubic shape. If you like the Apple G4 Cube, you should like our Komodo Server."

MacNN tells us the Komodo is available in multiple colours and is actually rather bigger than Apple's Cube - it's roughly twice the size of the Mac. DA hasn't released a spec. but the machine is known to be based on Linux, so we assume there's an x86 chip sitting in there somewhere.

What there isn't, says MacNN, are the Cube's notorious cracks/mould lines. So even if Apple doesn't sue DA Computing, perhaps it should at least ask the Taiwanese to teach the company how to model in plastic... ®

Related Link

MacNN on Komodo Server

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.