dcsimg

Base Teardown of the Microsoft Surface Pro Reveals its Un-Reparability

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


As it turns out, the new Surface Pro is not what a technician would call a repair-friendly machine. The fact is, its officially one of the least repairable devices on the market today. We thought the iPad was hard to fix, but in a teardown of Microsoft’s tablet-laptop hybrid, iFlixit gave it a solid and rock-bottom score of one. Yes, that’s one out of a possible ten. Apple’s iPad came in at a soaring 3. Read the full details of iFixit’s breakdown here.



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • As IT organizations continue to explore ways that artificial intelligence, machine learning and deep learning can help the business innovate and discover new efficiencies, an important question begins to surface: Where will they find the infrastructure to support these compute-intensive, next-generation applications? In this IT Roundtable panel discussion, our experts cite current use cases as examples of how cloud-based infrastructure helps businesses capitalize on the potential of AI and machine learning.

  • Understand your options for workload automation. In this IT Central Station report, real Workload Automation (WLA) users discuss their experiences with WLA tools and the functionality they find most useful for meeting IT and business requirements.    Learn how you can:   • Extend the value of WLA through simple, cost-effective integration • Improve user productivity with templates, self-service, and unified visibility • Discover and resolve scheduling issues quickly …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.