Feeds

JP Morgan's iPhone Nano report is rubbish

So says JP Morgan

The Power of One Brief: Top reasons to choose HP BladeSystem

Yesterday's report from JP Morgan that Apple is building some sort of slimline iPhone? It's been discredited. By JP Morgan.

On Monday, Reuters leaked news of a JP Morgan report that trumpeted the imminent arrival of a smaller, cheaper version of Apple's new-age smarphone. Kevin Chang, a JP Morgan analyst based in Taiwan, claimed that this super-svelte iPhone would be based on the iPod Nano - Apple's ultra-slim music player - citing unnamed people "in the supply chain" and an application with the U.S. Patent and Trademark office.

Now, less than twenty-four hours later, The Unofficial Apple Weblog has dug up a new JP Morgan report that calls Chang an idiot - roughly speaking. "One of our colleagues in Asia, Kevin Chang, published a note discussing his expectations for a low-end 'Nano' version of the iPhone," reads the new report, from a trio of New York-based JP Morgan analysts, Bill Shope, Elizabeth Borbolla, and Vlad Rom. "We caution that the potential for a low-end, subsidized phone from Apple seems unlikely in the near term."

The New York analysts say that they're unable to confirm the information Chang attributes to unnamed sources and that he's silly to put so much stock in an Apple patent filing. "Apple often publicly files patents that give little information on actual upcoming products," the report continues. They believe Apple will release a 3G version of the iPhone before any kind of nanolicious version. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.