Feeds
80%

Apple MacBook Air Early 2008

Style over substance - and thank God too

SANS - Survey on application security programs

Even so, the Air's not without its flaws. We've already mentioned the very spartan array of ports, but there's another: the design of cooling system. The Air pulls air in through the keyboard and vents it out of a grille on the base, or vice versa. That's fine when you're using the air on a desk, where the airflow will be unimpeded, but it makes it tricky to use perched on your thighs. Do so and you'll block the vents.

MacBook owners might be wary of doing this in any case, having experience high Apple laptop baseplate temperatures, but the Air's a different beast that runs much cooler than the company's other machines. It's a lot cooler than the MacBook Pro when running exactly the same set of applications. Push the processor and upper and lower surfaces will warm up but never get unpleasantly hot as the MacBook Pro can. The fan will rev up in such circumstances, but we never found its hum intrusive.

Apple MacBook Air

Missing ports not missed

As it turned out, we didn't mind the absence of an optical drive or multiple USB ports either, but that's no excuse for not building either an extra USB or a Firewire port into the Air's array, and an Ethernet socket, for that matter. Apple's £19 USB-to-Ethernet adaptor works well enough but, like the remote control, really should have come bundled, given the Air's price.

The standard, hard drive version retails for £1199/$1799, to which you can add £829/$1299 for the SSD version. The price is high when compared to Apple's more mainstream laptops but less than what Toshiba is charging for its entry-level R500, and Sony for the Vaio TZ1. Like those machines, the Air is a niche product, aimed at folk willing to pay more for a machine that's as portable as possible. And the Air is certainly very portable.

So too are the Sony and the Toshiba but without the sacrifices Apple felt it necessary to make to get its machine so thin. A little more thickness for extra ports wouldn't have been much of a compromise and still left the Air with a slightly bigger screen and keyboard, and a faster CPU than the TZ1 and R500. Better looking too - that's enough of a differentiation without having to be thinner into the bargain.

SANS - Survey on application security programs

Next page: Verdict

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.