Hey Rory,
I have the 13" i7, but based on the 15% geekbench increase over the i5, I'm not sure the extra $300 is particularly worth it. You do get 180GB more in HDD storage however.
A better use of that $300 would be to get two things: a large external HDD for backups, which I view as necessary so if you don't already have one, do it. Second, a Wireless N Router. Apple Time Capsule gives you the wireless router and 1TB of storage all in one, for $299.
Here are Intel Spec Breakdowns (from the Horses Mouth):
i5,
http://ark.intel.com/Product.aspx?id=52224
i7,
http://ark.intel.com/Product.aspx?id=52231
Besides 2.3Ghz vs. 2.7Ghz, here are all the differences I noticed:
1. Turbo Boost: i5 2.9Ghz, i7 3.4Ghz
2. Cache: i5 3MB, i7 4MB
3. Bus/Core Ratio: i5 23, i7 27
4. Graphics Max Dynamic Frequency: i5 1.2Ghz, i7 1.3Ghz
5. Intel® Virtualization Technology for Directed I/O (VT-d): i5 no, i7 yes
6. Intel® Trusted Execution Technology: i5 no, i7 yes
7. AES New Instructions, i5 no, i7 yes
I didnt know what #5 and #6 were, here is what Intel says:
Intel® Virtualization Technology for Directed I/O (VT-d) extends Intel's Virtualization Technology (VT) roadmap by providing hardware assists for virtualization solution. VT-d continues from the existing support for IA-32 (VT-x) and Itanium® processor (VT-i) virtualization adding new support for I/O-device virtualization. Intel VT-d can help end users improve security and reliability of the systems and also improve performance of I/O devices in virtualized environment. These inherently helps IT managers reduce the overall total cost of ownership by reducing potential down time and increasing productive throughput by better utilization of the data center resources.
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. Intel Trusted Execution Technology provides hardware-based mechanisms that help protect against software-based attacks and protects the confidentiality and integrity of data stored or created on the client PC. It does this by enabling an environment where applications can run within their own space, protected from all other software on the system. These capabilities provide the protection mechanisms, rooted in hardware, that are necessary to provide trust in the application's execution environment. In turn, this can help to protect vital data and processes from being compromised by malicious software running on the platform.
Message was edited by: clickmyface
Message was edited by: clickmyface