Feeds

Apple's big week: the good, the bad, the ugly

Strange fruit

3 Big data security analytics techniques

WWDC Apple's Worldwide Developers Conference saw its fair share of big-ticket news items during the last five days.

There was the iPhone 3G S, the revelation of details about Apple's parallel OSes, Snow Leopard and iPhone 3.0, and the roll-out of the latest MacBook Pros.

However, there were plenty of other details you might have missed, capabilities you may not have pondered, and gripes and disappointments you have yet to stew.

Here then, in descending order of interest and value, are The Reg's picks for WWDC 2009: the good, the bad, and the ugly.

The Good

5. You-goo-proof iPhone display This nicety wasn't mentioned during the keynote, but it did show up on the iPhone 3G S Tech Specs page on Apple's website: the new iPhone will have a "Fingerprint-resistant oleophobic coating."

Those of you with even the most meager knowledge of Latin roots understand what that means: oil from your fingers won't muck up your iPhone's display as it now does, and cleaning the display will be a simple swipe'n'wipe action without the need for water or Windex. Yeah, it's a little thing - but for those of us with oily paws, a godsend.

4. Back-to-the-future drive connection Apple has never had the best FireWire implementation, as has been proven to anyone who's ever had to reset their Mac's FireWire PHYs by unplugging everything, shutting down, and waiting ten minutes.

Still, though, FireWire 800 beats the snot out of USB 2.0 - and will until USB 3.0 becomes the next standard. Welcome back, finicky-but-fast, power-hearty FireWire. When you left the low end of the Mac laptop line, we thought we wouldn't miss you. But we did. And thanks for bringing your li'l SD friend with you.

3. Business-conscious iPhone support The iPhone 3G S will include hardware encryption of data, a big plus for IT folks terrified that some executive bozo will lose his or her phone when it's packed with tons of sensitive data, emails, and the like. Coupled with the wipe-it-clean capabilities of the new Find My Phone capabilities, IT folks will sleep better at night.

Also, sessions and labs at WWDC included such business-friendly topics as iPhone Security Best Practices and Integrating iPhone into the Enterprise, both regarding the iPhone not as a fanboy's toy, but as a legitimate, profit-enhancing business tool.

2. Serious iPhone-graphics powers There's been a bit of a buzz about the iPhone 3G S's upgraded 600MHz ARM processor. Of more interest to lovers of a good graphics experience is its assumed PowerVR SGX graphics processor from Imagination Technologies, a company in which Apple has a decent-sized financial stake.

The PowerVR SGX supports the Open GL|ES 2.0 mobile graphics standard, which brings fully programmable 3D-graphics support to iPhone Software 3.0. Let's review: a faster CPU, a noticeably more powerful graphics processor, and support for advanced 3D APIs. We've come a long way since iWhack, eh?

1. Future-proofed APIs Of all that was announced at this week's festivities, the most far-reaching in importance may be two Snow Leopard technologies, Grand Central Dispatch (GCD) and OpenCL. Both are designed to help developers take advantage of the rapidly proliferating cores and threads in today's microprocessors, with GCD focused on general computing tasks and OpenCL aimed at compute-intensive parallizeable tasks such as graphics and media processing.

Apple has full control over GCD, so our assumption is that their engineers can tune GCD to work seamlessly and easily with the company's Xcode development environment and associated GCC compiler. Athough OpenCL was born at Apple, its open-sourciness is now managend by the Khronos Group. Word on the street is that it's harder to implement than GCD - but we'll wait to see what comes down the pike from these two leaps forward.

We would have asked developers what they learned about GCD and OpenCL at WDCC, but Apple made all attendees promise to keep their lips zipped about what went on during conference sessions. Which leads us to...

SANS - Survey on application security programs

Next page: The Bad

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.