By Adrian Kingsley-Hughes for Hardware 2.0 | July 29, 2014 -- 09:49 GMT (17:49 SGT)
(Source: Apple)
See also: Yosemite usage rates double following public beta
Today sees Apple refresh its premium MacBook Pro with Retina display lineup, bumping the CPU speeds and RAM, as well as dropping the prices of the high-end models, ahead of the release of OS X 10.10 Yosemite, and also in advance of the back-to-school buying frenzy.
Prior to this upgrade the base version of the 13.3-inch MacBook Pro with Retina display featured a 2560-by-1600 resolution at 227 pixels per inch retina display, 2.4GHz dual-core Intel Core i5 CPU, 4GB of 1600MHz DDR3L RAM, and 128GB of PCIe-based flash storage, and it had a price tag of $1,299. For the same price this model now comes with a 2.6 GHz Intel Core i5 chip and 8GB of memory.
The base version of the beefier 15.4-inch with Retina display model came with a 2880-by-1800 resolution at 220 pixels per inch display, 2.0GHz quad-core Intel Core i7 CPU, 8GB of 1600MHz DDR3L RAM, and 256GB of PCIe-based flash storage, all of which would have set you back $1,999. Following the refresh this now comes with a 2.2GHz CPU and 16GB of RAM.
16GB of RAM is now the only option for this high-end MacBook Pro.
Apple has also rejigged pricing, with the higher-priced 15.5-inch model featuring a discrete Nvidia GPU now down from $2,599 to $2,499.
The 13.3-inch non-Retina MacBook Pro with 2.5GHz dual-core Intel Core i5 still starts at $1,099.
This update to the MacBook Pro line comes ahead of the release of OS X 10.10 Yosemite, which is scheduled for release this fall, and brings a number of new features to users, including much closer integration between Mac and iOS devices.
See also:
Topics: Mobility, AppleAdrian Kingsley-Hughes is an internationally published technology author who has devoted over a decade to helping users get the most from technology.
Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.(function(d) { var e = d.createElement('script'); e.src = d.location.protocol + '//widgets.outbrain.com/outbrain.js'; e.async = true; d.getElementsByTagName("head")[0].appendChild(e);}(document));
In late 2013, Polycom surveyed 5,000 business professionals from all job levels around the world and built a survey report that looks at the biggest remote collaboration challenges and strategies to overcome them.
In this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat the scourge of malware attacks.
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise.
In late 2013, Polycom surveyed 5,000 business professionals from all job levels around the world and built a survey report that looks at the biggest remote collaboration challenges and strategies to overcome them.
In late 2013, Polycom surveyed 5,000 business professionals from all job levels around the world and built a survey report that looks at the biggest remote collaboration challenges and strategies to overcome them.
Advanced Malware Protection: Buying CriteriaIn this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat the scourge of malware attacks.
Advanced Malware Protection: Buying CriteriaIn this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat the scourge of malware attacks.
Comments
Post a Comment
Follow My Twitter http://twitter.com/iskandarX @iskandarX
Follow My Facebook http://facebook.ocm/iskandarX
Follow My Blog http://feeds.feedburner.com/IskandarxSociety-MakeMoneyOnlineIskandarxStylo
Follow Me on Google ++ https://plus.google.com/u/0/102871867053782912924
Jika Artikel ini Memuaskan Hati Anda, Sila Tulis Review Untuk Kami di: http://www.alexa.com/write/review/iskandarx.com.my
Please Use Proper Words To Comment. Do not put your site or any url link inside comment box please or I will remove the comment.