Feeds
80%
Apple_13in_MacBook_SM

Apple MacBook June 2009 release

Tweak time

  • alert
  • submit to reddit

High performance access to file storage

Review Pay attention now, because there’ll be a test on this at the end. This time last year, Apple’s laptop range consisted of two main product lines. The mainstream, consumer model for home users and the education market was the highly popular MacBook, with its 13in screen, white plastic casing and a price tag of around £700. Alternatively, for 'professional' users, there was the gleaming metallic design of the more powerful MacBook Pro, which was available in 15in and 17in versions with prices starting well in excess of £1000.

Apple White MacBook

Apple's MacBook: once the runt of the line, now the only non-Pro Mac laptop

Then, in October 2008, Apple revamped the MacBook, giving it a shiny new aluminium casing – along with a hefty price increase that took the starting price close to a grand. But, mindful of the recession, Apple also left one of the old White MacBook models on sale too. That meant that there were completely MacBooks - one plastic, the other aluminium - competing for the same audience.

In January 2009, there was an odd update to the White MacBook which actually decreased the processor speed from 2.1GHz to 2.0GHz – presumably to match the 2.0GHz starting point of the aluminium models – but compensated by giving the White MacBook the same GeForce 9400M integrated graphics chipset as the metal model. The ‘entry-level’ MacBook now offered features and performance to match its much more expensive sibling.

Apple is proud of its gleaming new aluminium baby and obviously didn’t want to undercut sales of that model so, barely six months after the last revamp, Apple has decided to completely overhaul its entire laptop line yet again.

Apple White MacBook

There are no external changes, only internal ones

The aluminium MacBook has been reworked and promoted to the rank of MacBook Pro. This means that the plastic MacBook is once again the sole mainstream model for consumers, while the shiny metal stuff is reserved purely for 'serious' folk. In other words, we’re back to where we started 12 months or so ago. It also means we can go back to just calling it the ‘MacBook’.

We hope that’s made everything clear….

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.