Feeds

Apple invite brings UK hacks out in iPhone fever

Not us, sob

High performance access to file storage

UK hacks have begun receiving invites to an Apple event scheduled to be held at the Mac maker's Regent Street, London store on 18 September. Headed "Mum is no longer the word", the email has already got journos forecasting the UK debut of the iPhone.

Not that we've had one, of course. Apple's policy of not engaging with websites that speculate about its future products takes in The Register and, unsurprisingly, its sister-site Register Hardware.

Not that Apple's PR flacks are too bothered about other UK technology websites writing up the rumours - quite a few that do have invites, we notice. Clearly, they have failed to ping on Cupertino's radar, since the ban has not come down from on high to the local agency.

Apple's invite
Apple's invite: is it the iPhone launch?

So is it the iPhone. Our moles deep within the O2 network just a few days ago claimed the iPhone would be announced by the end of this month, to coincide with the end of parent company Telefonica's current financial quarter.

It's no guarantee, of course, but the network is believed to be busily upgrading its network to support Edge, the faster-than-GPRS-but-not-3G data technology, which could point to the arrival of the current version of the iPhone and not a forecast - and much desired - UMTS version.

O2 is also expected to announce an unlimited data tariff within the next few weeks, which again could tie in nicely with an iPhone deal.

Of course, just because Apple announces the iPhone next week, doesn't mean it will be available then, but it can't be far off. Indeed, the similarly styled iPod Touch is due to arrive here at the end of the month, so next week's event would provide a good opportunity to promote both.

We have our blue jeans and black turtlenecks prepared, and we'll have a go at gatecrashing. The password is 'AppleTV sales figures'. Read all about it here, whether we succeed or not.

Combat fraud and increase customer satisfaction

More from The Register

next story
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.