Feeds
80%
Apple MacBook Late 2009

Apple MacBook mid-2010

White mischief?

  • alert
  • submit to reddit

Internet Security Threat Report 2014

I also appreciate Apple’s willingness to allow the great unwashed to open the case for component upgrades. Flip over the closed clamshell and you can open the base with a crosshead screwdriver, revealing the optical drive, Ram slots, battery and hard drive.

Apple MacBook 2010

The non-slip base is easily unscrewed to access the laptop's innards

Incidentally, Apple says the battery will last ten hours on a full charge in normal use. Reg Hardware’s own intense battery test, based on abnormal use - playing a 45-minute QuickTime movie on indefinite loop at full screen, full brightness and 50 per cent audio volume, Wi-Fi on and connected - saw the MacBook battery last five and a half hours away from the mains.

Power management in the MacBook is good. In normal use, it consumes an average of 23W, rising to 30W while charging the battery at the same time. In sleep mode, it consumes a mere trickle: just 0.6W, rising to 7W if it needs to charge the battery while snoozing.

Verdict

You can sniff at the benchmark results, frown at the 250GB hard drive and rub your chin at the 2GB Ram, but none of this tells you what it’s really like to play with an Apple MacBook. It is a terrific notebook computer that is great to use for pleasure and everyday work, and looks lovely being slid in and out of a student’s shoulder bag.

It’s expensive, but I don’t care: if you want cheap, go buy a tombstone. What I do care about, however, is the limited range of I/O ports. Please, sir, I want some more. ®

Thanks to the Square Group for the review unit.

More Apple Reviews

Mac Mini iPad 3G MacBook
Pro 15in
iPhone 4

Beginner's guide to SSL certificates

80%
Apple MacBook Late 2009

Apple MacBook mid-2010

This non-pro notebook is cute but coy and comes with almost everything a consumer will need.
Price: £849 RRP

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.