Feeds

Ban-dodging Mac Pro to hit Blighty's shops as Apple bows to fan fears

It still looks like a black wastepaper bin, though

Remote control for virtualized desktops

Apple is preparing to release a new version of its high-end Mac Pro computer in Blighty almost a year after Eurocrats banned the sale of a previous model.

A shipping date has been set for the new Mac Pro, which is the only fruity computer which allows any sort of upgrading. The Pro is aimed at business customers who need enough oomph to power demanding applications like video editing packages.

The kind-hearted rulers of Europe banned the last Mac Pro model last year because its cooling fan guards didn't meet an updated safety spec issued by the International Electrotechnical Commission. It also fell foul of rules on the protection of electrical ports.

Luckily for the parents of inquisitive toddlers or techies with wandering hands, the new Mac Pro has now been deemed safe enough for world+dog to get computing with.

According to the fruity firm's British website, the high end machine is "built for creativity on an epic scale".

The latest incarnation of the Mac Pro went on sale in the US on 19 December, boasting 64GB of DDR3 memory and a 3.7GHz quad-core Intel Xeon E5 CPU. ®

Intelligent flash storage arrays

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.