Feeds

iPad 2 made from T-Rex fossils costs £5m

Extreme bling

Choosing a cloud hosting partner with confidence

We've seen hardware go so overboard with gem-encrusted bling, that it was difficult to imagine it getting any more expensive. Insert some dinosaur fossils though and - hey presto! - you can sell an iPad for £5,000,000.

The iPad 2 Gold History takes blingage to new extremes. Not only are these slabs covered in two kilos of 24 carat gold and 12.5 carat diamonds, but feature a bezel made from ancient rock and the crushed remains of a Tyrannosaurus Rex.

iPad 2 Gold History

Having passed its 75 million birthday, Canadian Ammolite is the oldest stone in the world. Some 750g of the precious stuff was mixed with 57g of fossilised T-Rex leg to create the bezel.

Meanwhile, the rear features an Apple logo made from 52 individually-set gemstones and the front includes an 8.5 carat diamond surrounded by a further 12 small flawless ones.

Designer Stuart Hughes is well known for his luxury Apple products, already producing diamond-encrusted iPhones and heavy-duty golden MacBooks.

Just two iPad Gold History models will be produced and one has already been snapped up apparently, so if you fancy it, and have a spare five million pounds under the bed, then hurry up and take the last one. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.