Feeds

Man dissects Apple's Magic Mouse

PC mice were harmed during this teardown

The Power of One Infographic

If you’ve been wondering what’s so magical about Apple’s new Magic Mouse, you aren’t alone. US repair-and-parts shop iFixit has been asking itself the same question, so it took the mouse apart to find out.

Magic_Mouse_003

Apple's Magic Mouse, as dissected by iFixit

The Magic Mouse comprises of an aluminium base, topped off with a smooth multi-touch panel that iFixit said gives the device a “lustrous buttonless appearance”.

Unlike its predecessor - the Mighty Mouse - the Magic Mouse relies solely on gesture-based controls. You can, for example, scroll in any direction with one finger or swipe through web pages with two fingers.

IFixit’s teardown discovered that there isn’t actually any magic to the Magic Mouse.

Magic_Mouse_002

Batteries, touch sensors and a Broadcom chip make-up the Magic Mouse

The underside of Magic Mouse’s top surface is covered with orange capacitive touch sensors that pick-up the user’s finger movements, the firm said.

From here a Broadcom Bluetooth chip allows the Magic Mouse to talk to its host.

Magic Mouse – which can be ordered online now for £55 ($90/€60) - is powered by two ordinary AA batteries.

Magic_Mouse_001

The top of the mouse is translucent

Further information about the Magic Mouse teardown is available from iFixit’s website now. ®

Top three mobile application threats

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.