Feeds

Apple kills off the eMac

Intel-based iMac offered instead

Remote control for virtualized desktops

Apple has begun shipping an education-oriented version of its 17in Intel-based iMac - replacing its last remaining CRT-fitted all-in-one machine, the eMac.

The new iMac is based on a 1.83GHz Core Duo processor and contains 512MB of 667MHz DDR 2. The display's driven by the Intel GMA 950 GPU Integrated into the chipset. Long-term storage comes courtesy of an 80GB, 7,200rpm SATA hard drive, and the built-in optical drive is a simple DVD-ROM/CD-R/RW unit.

The machine ships with 802.11b/g Wi-Fi and Gigabit Ethernet on board. It has Apple's usual iLife 06 software bundle. It costs £639 in the UK, $899 in the US.

The eMac was launched in April 2002 as a cheap, education-friendly alternative to the second-generation, angle-poise iMac. Unlike the earlier iMac, on which it was modelled, the eMac sported a flat CRT. A 17in model, at that - the old iMac never got above a 15in display. Indeed, the eMac won many buyers who'd bought an iMac but wanted a larger display without getting a pricey LCD model. ®

apple emac - r.i.p.

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.