Feeds

Apple's big week: the good, the bad, the ugly

Strange fruit

3 Big data security analytics techniques

WWDC Apple's Worldwide Developers Conference saw its fair share of big-ticket news items during the last five days.

There was the iPhone 3G S, the revelation of details about Apple's parallel OSes, Snow Leopard and iPhone 3.0, and the roll-out of the latest MacBook Pros.

However, there were plenty of other details you might have missed, capabilities you may not have pondered, and gripes and disappointments you have yet to stew.

Here then, in descending order of interest and value, are The Reg's picks for WWDC 2009: the good, the bad, and the ugly.

The Good

5. You-goo-proof iPhone display This nicety wasn't mentioned during the keynote, but it did show up on the iPhone 3G S Tech Specs page on Apple's website: the new iPhone will have a "Fingerprint-resistant oleophobic coating."

Those of you with even the most meager knowledge of Latin roots understand what that means: oil from your fingers won't muck up your iPhone's display as it now does, and cleaning the display will be a simple swipe'n'wipe action without the need for water or Windex. Yeah, it's a little thing - but for those of us with oily paws, a godsend.

4. Back-to-the-future drive connection Apple has never had the best FireWire implementation, as has been proven to anyone who's ever had to reset their Mac's FireWire PHYs by unplugging everything, shutting down, and waiting ten minutes.

Still, though, FireWire 800 beats the snot out of USB 2.0 - and will until USB 3.0 becomes the next standard. Welcome back, finicky-but-fast, power-hearty FireWire. When you left the low end of the Mac laptop line, we thought we wouldn't miss you. But we did. And thanks for bringing your li'l SD friend with you.

3. Business-conscious iPhone support The iPhone 3G S will include hardware encryption of data, a big plus for IT folks terrified that some executive bozo will lose his or her phone when it's packed with tons of sensitive data, emails, and the like. Coupled with the wipe-it-clean capabilities of the new Find My Phone capabilities, IT folks will sleep better at night.

Also, sessions and labs at WWDC included such business-friendly topics as iPhone Security Best Practices and Integrating iPhone into the Enterprise, both regarding the iPhone not as a fanboy's toy, but as a legitimate, profit-enhancing business tool.

2. Serious iPhone-graphics powers There's been a bit of a buzz about the iPhone 3G S's upgraded 600MHz ARM processor. Of more interest to lovers of a good graphics experience is its assumed PowerVR SGX graphics processor from Imagination Technologies, a company in which Apple has a decent-sized financial stake.

The PowerVR SGX supports the Open GL|ES 2.0 mobile graphics standard, which brings fully programmable 3D-graphics support to iPhone Software 3.0. Let's review: a faster CPU, a noticeably more powerful graphics processor, and support for advanced 3D APIs. We've come a long way since iWhack, eh?

1. Future-proofed APIs Of all that was announced at this week's festivities, the most far-reaching in importance may be two Snow Leopard technologies, Grand Central Dispatch (GCD) and OpenCL. Both are designed to help developers take advantage of the rapidly proliferating cores and threads in today's microprocessors, with GCD focused on general computing tasks and OpenCL aimed at compute-intensive parallizeable tasks such as graphics and media processing.

Apple has full control over GCD, so our assumption is that their engineers can tune GCD to work seamlessly and easily with the company's Xcode development environment and associated GCC compiler. Athough OpenCL was born at Apple, its open-sourciness is now managend by the Khronos Group. Word on the street is that it's harder to implement than GCD - but we'll wait to see what comes down the pike from these two leaps forward.

We would have asked developers what they learned about GCD and OpenCL at WDCC, but Apple made all attendees promise to keep their lips zipped about what went on during conference sessions. Which leads us to...

SANS - Survey on application security programs

Next page: The Bad

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.