Feeds

The forgotten, fat generation of Mac Portables

Long before the Air, there was Lord Lard Ass

High performance access to file storage

A plethora of ports

Before we open up our Macintosh Portable to see what makes the beefy fellow tick, let's take a quick look at how it connected to the outside world.

The Portable came with a full complement of ports, comparable to those found in all-in-one Macs of its era, but with the notable addition of a DB-15 port for attaching an external display — an unusual luxury at the time.

Apple Macintosh Portable: back plane

The Portable packed a fine collection of now-obsolete ports (click to enlarge)

The ports are gathered into two groups on the back of the box. On the right hand side are power and stereo audio-out jacks, one four-pin mini-DIN ADB (Apple desktop bus) port for adding a mouse, and two eight-pin mini-DIN RS-232/RS-422 serial ports that have AppleTalk/LocalTalk slo-mo networking capability, but are labeled with printer and modem icons.

Apple Macintosh Portable

As with all Macs since the very first, networking was built in — slow, but built-in (click to enlarge)

Separating the two groups of ports is an opening that would house the RJ-13 port of an internal 2400bps V.22bis modem card, should you have chosen to pop for that option. As you'll see when we open this beast up, the slot for the modem is easy to access — and to identify, being labeled, well, Modem.

Apple Macintosh Portable

If you miss SCSI, you're one in a million (click to enlarge)

Over on the left-hand cheek of the Portable's rump is the aforementioned DB-15 external-video port, plus a DB-19 floppy port and DB-25 SCSI (small computer system interface) port that topped out at a whopping 1.5MB per second — theoretically, at least.

For you young 'uns, it may be instructive to learn that moody, unpredictable, termination-touchy SCSI didn't disappear from Macs until the original Bondi Blue iMac shipped in August of 1998. It was thankfully supplanted by FireWire 400, first in January 1999's blue-and-white Power Mac G3 — aka "Yosemite" — and then in the third iteration of the iMac in October of that year.

High performance access to file storage

Next page: Easy entrance

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.