Feeds

Apple's Time Machine now works as advertised

USB drive backup from Airport base station

HP ProLiant Gen8: Integrated lifecycle automation

Apple has finally opened OS X Leopard's Time Machine wireless backup capability to disk drives lacking the glossy plastic anointment of Cupertino.

With a Wednesday release of software updates, Time Machine can now recognize a USB hard drive connected to a wireless network as valid backup disk. That is — assuming the drive is hooked up to Apple's latest Airport Extreme 802.11n Base Station.

After installing Time Machine and AirPort updates version 1.0 (and updating the Airport firmware), USB drives will have equal access to Time Machine's wireless backup skills as Apple's own Time Capsule appliance.

OS X Time MachineBefore Leopard was released to the public, Apple advertised a wireless backup option for Time Machine from the get-go. Last Oct., however, Apple not only mysteriously killed the feature but (if you don't mind us getting historical) rubbed out every past reference of the feature like it was Hatshepsut's name on an obelisk. In cruder terms, Apple went 18th Dynasty Egypt on its ass.

Apple later began shipping Time Capsule as the only practical way to use Time Machine without physically plugging a hard disk into a computer.

It's nice to see Apple programmers getting back to Leopard after lavishing so much attention on the iPhone. The update is available via the Software Update application, or as a download at the Apple Support web site. ®

Bootnote

In order to update the Airport firmware, launch Airport Utility (Applications->Utilities->Airport Utility) after installing the update. This will prompt the user to apply the 7.3.1 firmware update to the base station.

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.