Bramitam

Braimtam Online

bramitam - bramitam

A brief history of the Apple MacBook

Published on Sunday, March 06, 2011 // , , ,

/doubleclick_ads.js?2531"> Sign in Infoworld ChannelsApplication DevelopmentApplicationsCloud ComputingData Center Data Explosion Mobile TechnologySecurityVirtualization News Blogs Test Center Technologies Tech Watch White Papers Webcasts Deep Dives Video More Our Blogs InfoWorld Tech Watch InfoWorld Readers: Off the Record Bruzzese: Enterprise Windows Cringely: Notes from the Field Grimes: Security Adviser Gruman: Mobile Edge Knorr: Modernizing IT Lewis: Advice Line Linthicum: Cloud Computing Marshall: Virtualization Report McAllister: Fatal Exception Prigge: Information Overload Rodrigues: Open Sources Snyder: Tech's Bottom Line Venezia: The Deep End See all Blogs Feature The best hardware and software of the year

InfoWorld's 2011 Technology of the Year Awards recognize the best products at the forefront of today's top data center, desktop, mobile, and programming trends more

Latest Reviews HTML5 in the browser: HTML5 data communications Top 10 free open source tools for network admins InfoWorld review: Fabulous PHP frameworks HTML5 in the browser: Local data storage The best hardware and software of the year Test Center Home Feature Best Practices to Ensure SAP Availability

Ensuring the continuous availability of mission-critical systems is a high priority for corporate IT groups. We'll outline the five best practices that IT administrators can implement to maximize the uptime of their SAP system. We also introduce the SteelEye Protection Suite for SAP, the leading platform for high availability of SAP systems. more

More White Papers Overcoming Eight Common Power Management Challenges A Practical Look at Data Center Sustainability Oracle Exadata Exceeds Expectations Cost Effective Security and Compliance with Oracle Database 11g Release 2 Oracle Database 11g for Data Warehousing and Business Intelligence Best Practices for a Data Warehouse on Oracle Database 11g Oracle Office: Open Your Office for the Cloud Oracle Exadata: A Data Management Tipping Point See all White Papers Feature SteelEye Protection Suite for Linux

Ensuring the availability of business-critical applications and data is a requirement for successful enterprises. Any strategy to address these requirements must include the right solutions to maximize application and data availability and to provide protection against events; ranging from human error to natural disasters that may impact access to these business resources. more

More Webcasts Oracle Business Intelligence 11g for IT Managers Latest Trends in Desktop Virtualization and Windows 7 Migration Webcast: Best Practices for DDoS Mitigation Protecting Your Network from Rogue Security Software Oracle Business Intelligence Foundation Suite - Analytics for the Performance Driven Organization Get Mobile Right...Or Else! Checklist: Ways to Manage-and Integrate-Mobile Devices into Your Infrastructure Guide to Insider Threat Protection See all Webcasts Podcasts The Virtualization Report The SOA Report InfoWorld Daily See all Podcasts Face-to-FaceGaining Control of Your Enterprise Explosion See all Face-to-Face Virtual Conferences See all Virtual Conferences InfoClipzInfoClipz: Cloud computingInfoClipz: Green ITInfoClipz: Unified communicationsInfoClipz: Storage virtualizationInfoClipz: Server virtualization LineupsLatestNewsInfoClipzScreencastsAnalysisSponsored InfoWorld Video Home ChannelsApplication DevelopmentApplicationsCloud ComputingData CenterData ExplosionMobile TechnologySecurityThe Industry StandardVirtualization Topic CentersArchitectureBusiness IntelligenceComputer HardwareData ManagementGreen ITHTML5  MacMicrosoft WindowsNetworkingOpen Source SoftwareSOAStorage See all Technologies PopularAbout UsApps and ServicesAwardsEventsiGuidesInsider ArticlesIT JobsNewslettersQuizzesRSS and TwitterSlideshows Solution CentersDell EMC and Oracle 11G Innovative Efficiency Solutions CenterIBM Service Lifecycle ManagementIpswitch Managed File Transfer SolutionsIron Mountain Solving Information Management ChallengesManaging Risks in Virtualized and Cloud EnvironmentsRiverbed WAN OptimizationSymantec Small Mid Business SolutionsXerox Managed Print ServicesView all Solution Centers InfoWorld Home / Computer Hardware / Slideshows / A brief history of the Apple MacBook A brief history of the Apple MacBook As Apple refreshes its laptop line, we take a look into the origins and evolution of the MacBook By Steven Borden-Weill | Network World 1 A brief history of the MacBook family 2 MacBook Pro 3 MacBook 4 MacBook Air 5 Unibody MacBook Pro 6 Unibody MacBook 7 New MacBook Pro 8 See another slideshow: Then and now: How technology has changed our lives A brief history of the MacBook family

While the iPad and iPhone seem to grab the lion's share of Apple headlines these days, the MacBook laptop line is holding steady as ever. Here's a look back at the evolution of Apple's laptop.

Follow the latest in Apple technology with our Technology: Apple newsletter SLIDE 1 OF 8 March 04, 2011 Print |Add a comment Tags: mac laptop A brief history of...10 great error...How, where, and...What's hot in... See all Slideshows Sign In to comment 10 great error messages 20 years of innovative Windows malware Can the Atrix 4G really become your next PC? How, where, and when IT pros cheat Welcome to the iPad 2: Inside Apple's new tablet Recommended ResourcesGuiding iPhone into the business world | WebcastThe Right Partners, The Right Platforms | WebcastExtending Client Refresh – 11 Steps to Maximize Savings | WebcastVirtualized Database Performance Comparison: Dell vs. IBM | White PaperVirtualized Database Performance Comparison: Dell PowerEdge R815 vs. Two HP ProLiant DL380 G7s | White PaperEMA: The Journey to Unified Computing | White PaperEMA: Data Center Management | White PaperCisco UCS Blade Server Chassis Power Modes | White PaperSee all White Papers / WebcastsRecommended Resources Today's Headlines: First Look Newsletter

Find out what will be news for the day, with our first-thing-in-the-morning briefing.

Test drive the world’s leading SSL for free at verisign.com/ssl/free-trialSign up for a free 30-day trial of Cisco Show and Share!ManageEngine: End-to-End Java Performance Management. Download Product Now!Transform with Mobile AppsMaximizing Business Application FunctionalityIPv6: Complete these 5 Steps to PrepareComparing Private Line, Frame Relay, ATM, Ethernet and IP VPNsLearn how Red Hat delivers modern message-oriented integration with AMQPHP BladeSystem powered by AMD Opteron™ 6100 Series processorsSymantec Security Webcast Series: Protection for the Modern EnterpriseEMC Power, Iomega Price! VMware-certified network storage, 2-24TB.Focus on Business. Let Rackspace Manage Your Cloud.New guide shows you how to accelerate unified communications ROI.Eaton's Intelligent Power® Software Suite, all the tools you need to monitor and manage power devices on your network.ERwin® in the Cloud: How Data Modeling Supports Daas ImplementationsOnly protect the information you need with Symantec Backup Exec.Discover how to make e-discovery easier. Find out now.One number. One voicemail. Sprint Mobile Integration.iTKO - The DevTest Cloud: Virtual software labs eliminate constraintsLive Webcast: Don’t Fire Your Firewall Read the white paper on fast iPad and iPhone developmentHP ProLiant FlexFabric enabled server powered by Intel® Xeon®Accurate time synchronization - Symmetricom's network time servers.Mobility Applications Before and AfterKeep Your Enemies Closer: Get Proactive about SecurityFirewall podcast Q&AsChoosing the Right Metropolitan Ring For Your BusinessThis year, go Beyond the Hour at www.earthhour.org/beyondthehour.Go on the offense with a proactive IT security defense.Unleash the Power and Performance of Physical and Virtual DesktopsPower Your Applications with Rackspace CloudGet Proof. Not Promises! Take the Netezza TestDrive..The SMB IT Decision Maker's Guide: Choosing a SaaS Service Management SolutionWith Xerox, you'll be ready for real business. Find out how>HP StorageWorks D2D2500 Backup System with Intel® Xeon® 5500 seriesKnow where your sensitive data is with Symantec Data Loss PreventionKnow the biggest risks to your small business. Find out now.Protect 500 virtual machines in 17 minutes with CommVault® Simpana® software!How are YOU investing in efficiency? Check out CIO Debate today and compare your strategies against your peers.Why Virtualize? About Us| Advertise| Contact Us| Newsletters| Privacy Policy| Reprints, Permissions, Licensing| Terms of Service| About AdChoices The IDG Network CFOworld| CIO| Computerworld| CSO| DEMO| GamePro| Games.net| IDC| IDG| IDG Connect| IDG Knowledge Hub| IDG TechNetwork| IDG Ventures| InfoWorld ITwhitepapers| IT World| JavaWorld| LinuxWorld| Macworld| Network World| PC World

--> ©1994-2011 Infoworld, Inc.

View the Original article

Subscribe to our RSS Feed! Follow us on Facebook! Follow us on Twitter! Visit our LinkedIn Profile!