Feeds

iTablet to be called iProd?

iPhone code uncovers mystery codename

5 things you didn’t know about cloud backup

Reports that Apple may be developing a tablet PC are nothing new, with many convinced that the device will be called the iTablet. However, uncovered Apple software code has since revealed that the rumoured gadget may have a slightly weirder name.

iprod_01

Could the iTablet really be called the iProd?
Credit: ars technica

A screenshot of an updated USBConfiguration.plist located within the iPhone’s OS 3.1 beta update - discovered by website ars technica - contains two references to something called the “iProd”.

An odd name, certainly, but one that immediately conjures up images of index fingers and thumbs caressing the glass panel of a touchscreen device - such as a tablet PC.

Text strings within the update also mention “ConfigurationDescriptors”, “deviceID” and “productID” codes for two iProd versions, the “iProd0,1” and the “iProd1,1”.

While this isn’t categorical proof that a touchscreen Apple tablet PC is in the works, it’s worth noting that the moniker appears in the same list as various existing iPod and iPhone configurations, such as “iPod1,1” and “iPhone3,1” – the latter of which refers to the iPhone 3GS.

We will keep you posted as further iTablet/iProd news emerges.

The essential guide to IT transformation

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.