Feeds

Fanbois spy future iPhone in log file

Predicting the inevitable

Intelligent flash storage arrays

The first oblique references to the next generation of Apple iPhones have been found in the wild.

According to a report by MacRumors, usage logs that provide developers with information on which devices are using their software have begun to include references to "iPhone3,1."

There is - as of today - no iPhone3,1. The current model, the iPhone 3GS, bears the designation of iPhone2,1. Therefore, the tea-leaf readers surmise, iPhone3,1 must refer to the next iPhone that Apple has coming down the pike.

The developer that reported the tell-tale identifier, Pandav, offers schedule-checking iPhone apps for the San Francisco Bay Area Rapid Transit light-rail system, (App Store links) iBART (Free) and iBART Live (no relation to iFart, iFart, or iFart).

The sighting of iPhone3,1 references in Pandav's iBART usage logs seems to indicate that the device is being tested in the San Francisco Bay Area, near the southern end of which is Apple's hometown of Cupertino.

MacRumors reminds us that the iPhone2,1 identification string was first similarly sighted in the Bay Area about eight months before the iPhone 3GS was released. iPhone releases have come in June 2007, July 2008, and June 2009, so an eight-month test period for iPhone 3,1 would keep iPhone3,1 on that early-summer release schedule.

Check back in June or July 2010 - although there is certain to to be a flood of rumors about the next-gen iPhone's capabilities before then. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.