Feeds

Crazy Japanese create iMac-like iPod dock

Touch dock boasts iMac style

Choosing a cloud hosting partner with confidence

You want an Apple iMac, but don’t have either the space or funds for one. What do you do? One Japanese manufacturer has designed a dock that gives the iPod Touch the appearance of a miniature iMac.

iPod_dock_03

iClooly: is it an iMac or is an iPod Touch?

The so-called iClooly is simply an aluminium stand that, unsurprisingly, measures just slightly larger than the Touch – allowing Apple’s portable music device to slot horizontally inside. The stand doesn’t boast as much processing power as the 3.06GHz iMac, but is much more portable because the dock weighs just 55g. It's even got a circular hole in the back, for cables.

iPod_dock_01

The dock rotates by 90°

The Touch dock can also rotate through 90°, enabling you to use the music and movie gadget in either a portrait or landscape orientation.

Presumably there are several advantages to slotting your Touch into an iMac-alike dock, although most probably centre on aesthetics. For example, it’ll make the player look much sleeker when sat beside your MacBook Air.

UK specific pricing details or availability haven’t been announced yet - the unit was released in Japan today - but more details are available online.

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.