Feeds

Reseller readies custom-made tablet Mac

ModBook successor to last year's iTabs

Internet Security Threat Report 2014

US Mac supplier Other World Computing (OWC) has had enough of waiting for Apple to ship a tablet form-factor Mac and plans to launch one of its own next week. Dubbed the ModBook, the unit's appears to be a standard MacBook disassembled and put back together again as a pen-computing platform.

The ModBook is a joint project between OWC and US hardware customisation specialist Axiotron. Neither company's saying much about the machine until its formal unveiling at Macworld Expo next week, but they did reveal the ModBook will be offered with an optional integrated GPS receiver.

Mac OS X already has support for pen input, thanks to its Inkwell writing- and gesture-recognition system.

iTablet Mac tablet

ModBook isn't the first portable Mac remodelled in tablet form. Only a year ago, in January 2006, an enterprising Mac fan offered a reconstructed iBook on eBay as the iTabs. The machines were customised for successful bidders on a one-by-one basis.

The ModBook incorporates the MacBook's iSight webcam and is DVD-ROM/CD-RW combo drive. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.