Feeds

PC case maker caters to iPod owners

Make your computer look like your MP3 player

  • alert
  • submit to reddit

Scythe A-Pod PC CaseEnterprising Japanese PC case maker Scythe has come up with a design to cash in on iPod mania among Windows users: an all-white unit that mimics the player's clickwheel with its control and LED layout.

The circular panel is divided into five segments. In the middle is a circular button - the case's power switch - surrounded by four pie slices: a Reset button at 12 O'Clock; and a pop-out panel that hides a pair of USB 2.0 ports, a Firewire connector, and stereo input and output jacks at 6 O'Clock. Between these, on opposite sides, are two slices containing disc activity LEDs.

And just where the screen would be, there's a proportionally sized pop-out panel behind which you might hide a floppy drive, say.

The company will ship its A-Pod case on 14 July, Japanese-language site PC Watch reports, which claims the price will be around ¥11,800 ($105/£60).

Beyond the interesting front panel, the A-Pod is a pretty standard ATX casing with room for four 5in drives and two 3.5in units. There's a 500W power supply on board with an extra connector for PCI Express graphics cards. ®

Related stories

Apple pushes Podcasts through iTunes
Cingular listens on iTunes phone
Apple sued over iTunes - again
Nokia N91: an iPod-class contender?
Recycle your iPod

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.