Feeds
85%

Apple MacBook

A complete overhaul only improves this neat notebook

3 Big data security analytics techniques

A point to note, though: the cheaper of the two new MacBooks lacks the keyboard backlight. Did it really add to much to the machine's bill of materials, Apple?

The standard pair of USB 2.0 ports are still there on the left-hand edge of the unit, along with digital audio inputs and outputs, and a "SuperDrive" multi-format CD/DVD burner. However, Apple’s traditional Firewire port has disappeared. That’s not surprising – the writing has been on the wall for Firewire for some time, although it’s very disappointing for those of us that use Firewire hard disks, or have camcorders with Firewire connectors.

Apple MacBook

The new trackpad allows the use of multi-finger ‘gestures’

Gone too is the mini DVI monitor port. In its place, there’s a new mini DisplayPort interface for hooking up an external monitor – such as the new 24in monitor that Apple has designed specifically for use with its laptops. The DisplayPort upgrade makes sense - it's the emerging standard for digital computer-monitor connections, but the full-size port isn't exactly large, leaving us wonder whether this is really just another excuse to force folk to buy an adaptor. Certainly, you don't get one in the box.

Again, the new MacBook Pro had the new mini DisplayPort connector, so it’s clear that the two product lines really are starting to merge together now. That’s good news for buyers who might want to hook the laptop up to a larger monitor, perhaps to use the MacBook as their main desktop machine, as it means that they can now get the features they need without having to pay for the more expensive MacBook Pro.

In fact, Apple CEO Steve Jobs – with his fabled ‘reality distortion field’ obviously set to 11 – actually implied that this was a price cut as the MacBook now provides features and performance comparable to that of the MacBook Pro for less than £1000.

MacBook Late 2008

The Air influences are clear in the keyboard

There’s a kind of logic to this, as the new MacBook really does blur the once-clear dividing line between Apple’s ‘pro’ and ‘consumer’ laptops. And, to be fair, the price of the new MacBook still compares quite favourably to rival premium-name brands.

SANS - Survey on application security programs

Next page: Verdict

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.