Oppenheimer's Yair Reiner compares new iMacs with computers from Dell and Hewlett-Packard. The boo birds came out early to Apple’s latest desktop catwalk, mostly citing—once again—high prices in one of the worst recessions on record. Everyone from analysts to even the Mac faithful expressed their dismay in chat rooms and comment sections.All, save one.Oppenheimer analyst Yair Reiner compared the new iMacs with comparable machines from Dell and Hewlett-Packard, and his finding flies in the face of conventional wisdom that Apple products are over-priced. He says the new iMacs match up favorably against Dell and HP’s All-in-One’s on a price-to-performance basis.“Apple’s pricing has been perpetually misrepresented and misunderstood over the years,” Reiner says. “With a few notable exceptions, such as the MacBook Pro, Apple has typically offered more hardware for the money than competitors. The common misperception stems from the fact that Apple doesn’t compete in low-end product segments, which raised the average price of Apple computers above the industry average.” Don’t believe him? He’s got the charts to prove it: Related content brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 2023 5 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest CyberFirst Girls aims to introduce girls to cybersecurity, increase diversity, and address the much-maligned skills shortage in the sector. By Michael Hill Sep 26, 2023 4 mins Back to School Education Industry IT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme CIE scheme aims to help organisations find quality service providers that can advise and support them in practising cyber incident response plans. By Michael Hill Sep 26, 2023 3 mins IT Governance Frameworks Incident Response Data and Information Security news Baffle releases encryption solution to secure data for generative AI Solution uses the advanced encryption standard algorithm to encrypt sensitive data throughout the generative AI pipeline. By Michael Hill Sep 26, 2023 3 mins Encryption Generative AI Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe