Saltar al contenido principal

Demontage van de Apple Watch Series 4

Inglés
Holandés
Paso 11
Apple Watch Series 4 Teardown: paso 0, imagen 1 de 3 Apple Watch Series 4 Teardown: paso 0, imagen 2 de 3 Apple Watch Series 4 Teardown: paso 0, imagen 3 de 3
  • Finally, we get to the core of all things: the Apple-designed S4 system-in-package.

  • Good news, everyone! The S4 is secured only with screws, and pops right out—a welcome change from the fiercely-glued SiPs of years past.

  • As always, the package itself is encased in a solid block of resin, meaning most of its secrets will be difficult to extract. Thankfully though, the RF components remain a little more exposed:

  • Avago AFEM-8087 (likely front-end module)

  • OU JQ

  • YY MEH ECE (this looks like a Bosch part, likely the fancy new accel + gyro)

  • Avago E827 I2033 0836

  • ST Microelectronics ST33G1M2 32-bit MCU with ARM SecurCore SC300—the same eSIM we found in the last Apple Watch and in the iPhone XS and iPhone XS Max.

Eindelijk bereiken de kern van dit alles: de door Apple ontworpen S4 system-in-package.

Goed nieuws, iedereen! De S4 is bevestigd met alleen maar schroeven en schiet er zo uit—een welkome aanpassing vergeleken met de stevig-vastgelijmde SiP's van vorige jaren.

Zoals altijd is het systeem zelf verpakt in een stevig blok van hars, wat betekent dat de meeste van haar geheimen lastig zullen worden ontdekt. Gelukkig liggen de RF-onderdelen wat meer open en bloot:

Avago AFEM-8087 (waarschijnlijk een front-end module)

YY MEH ECE (dit ziet eruit als een Bosch-onderdeel, waarschijnlijk de nieuwe accel + gyro)

AE827 I2033 0836

ST Microelectronics ST33G1M2 32-bit MCU met ARM SecurCore SC300—dezelfde eSIM die we in de Apple Watch van vorig jaar en in de iPhone XS en de iPhone XS Max vonden.

[* black] Finally, we get to the core of all things: the Apple-designed S4 system-in-package.
[* black] Good news, everyone! The S4 is secured only with screws, and pops right out—a welcome change from the fiercely-glued SiPs of years past.
[* black] As always, the package itself is encased in a solid block of resin, meaning most of its secrets will be difficult to extract. Thankfully though, the RF components remain a little more exposed:
[* red] Avago AFEM-8087 (likely front-end module)
[* orange] OU JQ
[* yellow] YY MEH ECE (this looks like a Bosch part, likely the fancy new accel + gyro)
- [* green] AE827 I2033 0836
+ [* green] Avago E827 I2033 0836
[* light_blue] ST Microelectronics [http://www.st.com/content/ccc/resource/technical/document/data_brief/81/c6/7d/4e/ae/23/4e/72/DM00095982.pdf/files/DM00095982.pdf/jcr:content/translations/en.DM00095982.pdf|ST33G1M2|new_window=true] 32-bit MCU with ARM [https://developer.arm.com/products/processors/cortex-m/sc300-processor|SecurCore SC300|new_window=true]—the same [http://www.st.com/en/secure-mcus/sim-esim.html?querycriteria=productId=SC2062|eSIM|new_window=true] we found in the [guide|97521|last Apple Watch|stepid=179040|new_window=true] and in the [guide|113021|iPhone XS and iPhone XS Max|stepid=216148|new_window=true].

Tus contribuciones son autorizadas bajo la licencia de código abierto de Creative Commons.