Feeds

iTablet to be called iProd?

iPhone code uncovers mystery codename

Choosing a cloud hosting partner with confidence

Reports that Apple may be developing a tablet PC are nothing new, with many convinced that the device will be called the iTablet. However, uncovered Apple software code has since revealed that the rumoured gadget may have a slightly weirder name.

iprod_01

Could the iTablet really be called the iProd?
Credit: ars technica

A screenshot of an updated USBConfiguration.plist located within the iPhone’s OS 3.1 beta update - discovered by website ars technica - contains two references to something called the “iProd”.

An odd name, certainly, but one that immediately conjures up images of index fingers and thumbs caressing the glass panel of a touchscreen device - such as a tablet PC.

Text strings within the update also mention “ConfigurationDescriptors”, “deviceID” and “productID” codes for two iProd versions, the “iProd0,1” and the “iProd1,1”.

While this isn’t categorical proof that a touchscreen Apple tablet PC is in the works, it’s worth noting that the moniker appears in the same list as various existing iPod and iPhone configurations, such as “iPod1,1” and “iPhone3,1” – the latter of which refers to the iPhone 3GS.

We will keep you posted as further iTablet/iProd news emerges.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.