Feeds

The Cube: Apple's daftest, strangest romance

Ten years on, we remember the bonkers box

High performance access to file storage

The problem was that Apple's customer base was really bifurcated into two camps back then - students and consumers who wanted an all-in-one, and looked for value, and the professionals who expected to expand their machines. The Cube was too expensive for the former, and too restrictive for the pros.

Getting Cubic now

Yet the unworldly design created a fiercely loyal fanbase who supported the market for add-ons. A succession of strong CPU upgrades, from Powerlogix, Giga and Sonnet, which took the Cube up to dual 1.7Ghz G4. There were also beefier, Quartz Extreme-capable graphics cards made available. Third parties even manufactured larger cubic cases - these were needed for the fans and cooling systems.

Don't overfeed the fish

The community lives on and gathers at Cubeowner.com, where the affection for the machines is evident. Do check out the galleries.

In the UK, you can pick one up for anywhere between £100 and £150 on eBay. The expansion options are limited, ruling out USB 2.0 cards for example, and you'll be stuck with a Parallel ATA drive that needs special drivers for drives larger than 120MB. But it will still run Mac OS X 10.4 Tiger well enough to get some work done. The problem is the bus speed is constrained; at 167Mhz it's ten times slower than a 1Ghz CPU, for example.

My first Cube was late adn DOA, and so was the second. Its replacement arrived two months later, spluttered for three weeks and then expired. All were motherboard blow-outs. It was enough to repel anyone but a fanatic from demanding another, so I didn't.

It was 2006 before I picked up a cheap Cube that had been upgraded to a noisy 800Mhz G4 with thanks to Sonnet. But it did great service for a couple of more years. You just had to leave a note on the desk reminding people not to leave their newspaper on the grill …

The Cube remains a quite bonkers, and quite brilliant expression of a particular design - a really outrageous statement. There was no reason it should ever have been cubic, let alone suspended in mid air. It should never have been made - we should be glad it was. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.