Feeds

Video captures camera-capable iPod Touch

Set for 7 September unveiling?

Business security measures using SSL

The iPod Touch looks set to gain a camera, if a recently leaked video is to be believed.

video_ipod_touch

Click for video

North American shock-jocks Steve Covino and Rich Davis - reporters of “dude culture”, apparently - recently posted a video to their online blog, which they claim shows a third-generation iPod Touch fitted with a rear-mounted camera.

It's been claimed for some time by a variety of moles that the next iPod Touch will sport a camera. Chinese sites have shown mock-ups of new Touch cases that include a hole on the back for a camera lens.

The model shown in the video – sent in by a dude culture fan – appears to be a pre-production third-generation iPod Touch, as it isn’t fitted with a front cover. This allows the video’s demonstrator to lift up the Touch’s screen, it’s worth noting.

video_ipod_touch_03

Is that a CMOS sensor we spy?

But is the gadget real? Well it certainly looks the business. The demoed model could be a non-functioning demo unit, though, because the video doesn’t actually show the model’s camera being used in real time.

A selection of still images also show the unit with a smash screen, and with various parts of the front and back cover lopped off. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.