Feeds

Slash your way inside Apple's Mac Mini

Putty knife adventure

7 Elements of Radically Simple OS Migration

Photos You can break into Apple's new Mac mini, but it's nerve-wracking. However, if you do, you can up its storage capacity to one terabyte.

On Wednesday, the folks at Mac repair-shop and parts-supplier iFixit tore a new 20-inch iMac into pieces. Today, they did the same with the new Mac mini.

Popping open a Mac mini for the first time is not for the faint of heart. Unlike the iMac teardown, which requires only a full complement of Torx drivers and a pair of dent-puller suction cups, disassembling a Mac mini requires a putty knife, serious leverage, and nerves of steel. After you've done it once or twice, however, it's easy.

Before we pry apart Apple's dwarfish desktop, let's take a look at its three main incarnations since the Mac Mini's original release in January 2005.

Mac mini: the three basic models

The original PowerPC G4 Mini (bottom), the Intel Core Duo (middle), the new Core 2 Duo (top)

The original Mac Mini was a PowerPC G4 machine, which went through a few upgrades before it was discontinued in February 2006. The PowerPC G5 never made it into a Mac Mini, running too hot for its tiny confines.

The first Intel Core Duo/Solo Mac Mini showed up in February 2006, ditching the modem and doubling the number of USB ports. It went through one processor upgrade, then received an Intel Core 2 Duo in August 2007.

Earlier this week, it received a more-powerful build-to-order Core 2 Duo and an additional USB port, swapped its DVI port for a Mini-DVI port and a Mini DisplayPort, upped its Firewire port from FW400 to FW800, and moved to an Nvidia GeForce 9400M integrated-graphics subsystem.

Mac mini teardown: inside the three generations of Mac minis

From left to right: the old, the middle-aged, and the newborn

The original Mac Mini had a toy surprise inside - one that was never used: an extra Firewire connection underneath its top. Rumor had it that it was originally was intended to support a built-in iPod dock. As you know, that dock never materialized.

Mac mini teardown: prying open the case

You didn't really need that warranty, right?

Build a business case: developing custom apps

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?