Language Selection

English French German Italian Portuguese Spanish

A first look at Apple's Intel Mac (with pix)

Filed under
Mac

The Apple Development Platform ADP2,1, as the systems are officially designated, features 3.6GHz Pentium 4 processors with 2MB of L2 cache operating on an 800MHz bus with 1GB of RAM.

The Intel systems run Mac OS X 10.4 Tiger identically on the surface as ordinary Macs, with the exception of a modified Processor System Preference (from Apple's CHUD tools) that allows the user to toggle Hyper-Threading on or off. Apple System Profiler includes a new line under Hardware listing CPU Features; for the 3.6GHz Pentium 4 this comprises a rather lengthy list of technical acronyms: FPU, VME, DE, PSE, TSC, MSR, PAE, MCE, CX8, APIC, SEP, MTRR, PGE, MCA, CMOV, PAT, PSE36, CLFSH, DS, SCPI, MMX, FXSR, SSE, SEE2, SS, HTT, TM, SSE3, MON, DSCPL, EST, TM2, CX16, and TPR.

Apple's System Profiler reports the graphics card as an Intel Graphics Media Accelerator 800. Inside the Intel Mac, DVI support for the video card is provided by a Silicon Image Orion ADD2-N Dual Pad x16. Oddly, neither Silicon Image's Web site nor Google turns up much information on the latter card, the latter yielding a single link to a recent Dell support forum posting.

The motherboard on the system is unmarked except for the word Barracuda. The system's internals are housed inside a case similar to Apple's Power Mac G5 systems but with a different configuration of fans.

Along with running Mac OS X, Windows XP installs without hitch on the Intel-based Mac, just as it would on any other PC, and booted without issue when installed on an NTFS-formatted partition. The only misbehavior sources encountered involved the video card. Initially, Windows refused to budge from an 800x600 setting on a 23-inch Cinema Display. Some prodding managed to get the screen to 1600x1200, but sources were unable to get Windows to take advantage of the entire screen.

Full Story with a few pictures.

More in Tux Machines

Security News

  • Security updates for Wednesday
  • Cisco learned from Wikileaks that the CIA had hacked its systems
    When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems swung into action. The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco's widely used Internet switches, which direct electronic traffic, to enable eavesdropping.
  • Exposed files on Microsoft's document-sharing site
    Confidential documents, passwords and health data have been inadvertently shared by firms using Microsoft's Office 365 service, say researchers. The sensitive information was found via a publicly available search engine that is part of Office 365. Security researchers said many firms mistakenly thought documents would only be shared with colleagues not globally. Microsoft said it would "take steps" to change the service and remove the sensitive data.
  • Russian Hacker Pleads Guilty for Role in Infamous Linux Ebury Malware
    The US Department of Justice announced yesterday that Maxim Senakh, 41, of Velikii Novgorod, Russia, pleaded guilty for his role in the creation of the Ebury malware and for maintaining its infamous botnet. US authorities indicted Senakh in January 2015, and the law enforcement detained the hacker in Finland in August of the same year.
  • Changes coming to TLS: Part One
    Transport layer Security version 1.3 (TLS 1.3) is the latest version of the SSL/TLS protocol which is currently under development by the IETF. It offers several security and performance improvements as compared to the previous versions. While there are several technical resouces which discuss the finer aspects of this new protocol, this two-part article is a quick reference to new features and major changes in the TLS protocol.

Red Hat and Fedora

Android Leftovers

CUPS 2.2.3 Adds Support for PPD Finishing Keywords, IPP Everywhere Improvements

CUPS 2.2.3 is the third point release to the stable 2.2 series of the project, bringing a bunch of IPP Everywhere improvements, such as support for all print qualities and media types that a printer supports, in the print queues. Additionally, it makes IPP Everywhere finishings support work correctly with common command-line and UI (User Interface) options, and updates the PPD generator to return helpful error messages. Support for PostScript Printer Description (PPD) finishing keywords was also introduced in this release. Read more