Feeds

Dealer debuts campest MacBook Pro in the universe

Gold Blend

Internet Security Threat Report 2014

Money no object? Then how about a 24-carat gold-plated MacBook Pro for your next laptop computer? US Mac dealer Powermax has begun offering just that.

Powermax gold MacBook Pro

The machine is Apple's 15.4in model with a 2.4GHz Core 2 Duo processor, which would customarily set you back $2499 - less than half what Powermax is asking to disassemble it, plate the aluminium surfaces with gold, suitably colourise the keyboard then put it all back together again.

The exterior is buffed up to a shine, while the interior is left with a more matt-like "satin" finish.

Powermax gold MacBook Pro

Powermax reckons the process will take a little while to complete - it warns that orders will take 4-5 weeks to fulfil.

The machine's lid of course retains the familiar light-up Apple logo. For an extra $3000, you have have Powermax pack the stencil with two carats worth of diamonds - "H/I in color and SI1-2 in clarity", the company said.

The perfect accompaniment, we say, for LaCie's Golden Disk hard drive...

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.