Feeds
75%
Apple Mac Mini

Apple Mac Mini 2010

Makes other SFF PCs look like towers

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

If you flip the Mini over, you’ll see that the base plate can be removed, so that you no longer need to perform open-heart surgery with a putty-knife in order to perform a memory upgrade.

Apple Mac Mini 2010

The insides are more accessible than before

Peering around the back you’ll see a Mini DisplayPort interface alongside the HDMI, and Apple also includes an HDMI-to-DVI adaptor in the box so that you can use it with a DVI monitor. Don’t forget that the Mac Mini is sold without monitor, keyboard or mouse. Apple clearly feels the new Mini is going to sit on desktops as well as the space next to someone's TV.

Another newcomer is the SD card slot – inconveniently positioned on the rear – alongside a set of four USB ports, Gigabit Ethernet, Firewire 800 and digital audio in/out.

But while Apple has really gone to town with the engineering and aesthetic aspects of the Mini, a closer look at the spec sheet shows that it has cut a few recessionary corners in other areas. The Mac Mini released towards the end of 2009 was available in two configurations: the entry-level model cost £529 with 2.26GHz Core 2 Duo processor and 2GB of Ram, or you could increase the processor speed to 2.53GHz and double up to 4GB Ram for £649.

In contrast, this new model is available in just one main configuration that costs £649 with a 2.4GHz Core 2 Duo - no Core i3 or i5 here - and 2GB of memory, albeit 1066MHz DDR 3.

Apple Mac Mini 2010

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.