TechLife

WHAT’S IN YOUR APPLE GEAR

APPLE HAS ALWAYS been as concerned about the insides of its products as the outsides.

Telling his biographer, Walter Isaacson, how his adoptive father taught him woodwork, Steve Jobs recalled that he’d use good timber even on the back of a cabinet: “For you to sleep well at night, the aesthetic, the quality, has to be carried all the way through.”

It would be a stretch to claim this high standard was met by the rushed design of the first Macintosh, although the signatures of its engineers were embossed on the inside of the case – a touch that would have been appreciated only by users who dismantled the first computer made for the kind of users who didn’t dismantle computers.

Today’s Macs, iPhones, and iPads mostly aren’t made to come apart easily, but their functionality would be impossible without the elegant efficiency of their internals. So just what is inside your Apple gear, and where did it come from? Let’s grab a toolbox, an atlas, and a periodic table, and we’ll find out.

ANODISATION THICKENS THE METAL’S NATURAL OXIDIZED OUTER LAYER INTO A  DURABLE, NON–CORRODING FINISH WITH CONTROLLABLE TEXTURE AND COLOR, GIVING SILVER, GOLD, AND SPACE–GRAY MACS, ALONG WITH ALL SIX COLORS OF THE IPHONE XR’S ALUMINIUM FRAME

It’s been said, not, and disassemble or “tear down” electronic goods. And third, Apple’s own Supplier and Environmental Responsibility Progress Reports, recognised as the most transparent and detailed in Silicon Valley.

You’re reading a preview, subscribe to read more.

More from TechLife

TechLife3 min read
Make The Most Of The Harmonisation Filter
If you want to make a composite from two or more images, there are two stages to carry out. First, there’s the task of cutting out and piecing the images together. Second, there’s the challenge of making the images look like they belong together. The
TechLife4 min readSecurity
Locking The Gate
As noted over in this month’s Privacy and Security column, routers are currently one of the primary vectors of attack against home users. A hacker who takes control of your router has the capacity to monitor and modify all unencrypted data going into
TechLife15 min read
Best Free Software For Vital PC Tasks
We all know the kind of ‘boring but useful’ tasks we should carry out regularly on our computers: backing up, syncing, eradicating junk and so on. But there are lots of things in life we should do, but don’t. One of the reasons we put off such PC tas

Related Books & Audiobooks