Feeds

Apple iPhone poised for China touchdown

1.3 billion to be served

Security for virtualized datacentres

It appears that Apple's plan to introduce its iPhone to 1.3 billion potential Chinese customers may have taken one more step towards reality.

According to ChinaTechNews.com, China Unicom "reportedly" reached an agreement with Apple that would bring the über-successful smartphone to the world's most populous market as soon as May of this year.

This latest rumor is one in a long series of informed speculation concerning Apple's Chinese plans. One analyst, for example, conjectured that Apple would resurrect its original GPS-free iPhone in order to please a security-conscious Chinese government.

Another theory is that the ChiPhone will be the oft-scuttlebutted iPhone Nano, a smaller-screen version of the current model.

If true, China Unicom's success in its iPhone negotiations with Apple would be a blow to China Mobile, whose talks with Apple regarding their handling of Chinese iPhone service reportedly broke down over a year ago.

But the China Unicom deal makes sense - if only because China Mobile has been granted the uniquely Chinese TD-SCDMA standard in the three-way 3G contract distribution recently announced by the Chinese government.

In that three-provider deal, China Telecom was awarded the contract for Qualcomm’s not-terribly-widespread CDMA-2000 standard, and China Unicom was grated the rights to WCDMA.

The iPhone supports WCDMA. China Unicom is a WCDMA provider.

ChinaTechNews.com's rumor makes sense. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.