Aller au contenu principal

Desmontaje del Apple Watch Series 4

Anglais
Espagnol

Traduction de l’étape 11

Étape 11
Apple Watch Series 4 Teardown: étape 0, image 1 de 3 Apple Watch Series 4 Teardown: étape 0, image 2 de 3 Apple Watch Series 4 Teardown: étape 0, image 3 de 3
  • Finally, we get to the core of all things: the Apple-designed S4 system-in-package.

  • Good news, everyone! The S4 is secured only with screws, and pops right out—a welcome change from the fiercely-glued SiPs of years past.

  • As always, the package itself is encased in a solid block of resin, meaning most of its secrets will be difficult to extract. Thankfully though, the RF components remain a little more exposed:

  • Avago AFEM-8087 (likely front-end module)

  • OU JQ

  • YY MEH ECE (this looks like a Bosch part, likely the fancy new accel + gyro)

  • Avago E827 I2033 0836

  • ST Microelectronics ST33G1M2 32-bit MCU with ARM SecurCore SC300—the same eSIM we found in the last Apple Watch and in the iPhone XS and iPhone XS Max.

Finalmente, llegamos al núcleo de todas las cosas: el sistema en paquete S4 diseñado por Apple.

¡Buenas noticias para todos! El S4 está asegurado solo con tornillos, y sale de inmediato, un cambio bienvenido de los SiP ferozmente pegados de los últimos años.

Como siempre, el paquete está envuelto en un bloque sólido de resina, lo que significa que la mayoría de sus secretos serán difíciles de extraer. Afortunadamente, los componentes de RF permanecen un poco más expuestos:

Avago AFEM-8087 (probable módulo front-end)

YY MEH ECE (esto parece una parte de Bosch, probablemente el nuevo acelerador + giroscopio)

AE827 I2033 0836

ST Microelectronics ST33G1M2 MCU de 32 bits con ARM SecurCore SC300: el mismo eSIM que encontramos en el último Apple Watch y en el iPhone XS y el iPhone XS Max.

[* black] Finally, we get to the core of all things: the Apple-designed S4 system-in-package.
[* black] Good news, everyone! The S4 is secured only with screws, and pops right out—a welcome change from the fiercely-glued SiPs of years past.
[* black] As always, the package itself is encased in a solid block of resin, meaning most of its secrets will be difficult to extract. Thankfully though, the RF components remain a little more exposed:
[* red] Avago AFEM-8087 (likely front-end module)
[* orange] OU JQ
[* yellow] YY MEH ECE (this looks like a Bosch part, likely the fancy new accel + gyro)
- [* green] AE827 I2033 0836
+ [* green] Avago E827 I2033 0836
[* light_blue] ST Microelectronics [http://www.st.com/content/ccc/resource/technical/document/data_brief/81/c6/7d/4e/ae/23/4e/72/DM00095982.pdf/files/DM00095982.pdf/jcr:content/translations/en.DM00095982.pdf|ST33G1M2|new_window=true] 32-bit MCU with ARM [https://developer.arm.com/products/processors/cortex-m/sc300-processor|SecurCore SC300|new_window=true]—the same [http://www.st.com/en/secure-mcus/sim-esim.html?querycriteria=productId=SC2062|eSIM|new_window=true] we found in the [guide|97521|last Apple Watch|stepid=179040|new_window=true] and in the [guide|113021|iPhone XS and iPhone XS Max|stepid=216148|new_window=true].

Vos contributions sont faites dans le cadre de la licence open source Creative Commons.