Feeds

Apple lawyer smacks Gawker with Mac tablet hint

Wins 'fabulous' gift pack

Choosing a cloud hosting partner with confidence

Super-secretive Apple has provided some of the best evidence yet that its long-rumored tablet is on the way. No, not by leaking photos or specs, but instead by threatening a website about soliciting said photos or specs.

On Wednesday, Gawker Media's Valleywag blog announced its Apple Tablet Scavenger Hunt, which offers hefty cash awards to anyone who could provide concrete evidence of the existence of the elusive tablet.

Thursday, Gawker received a letter from Apple's lawyers warning them against soliciting "photos, video, or a sample of an unannounced and highly confidential Apple product."

The wording of that warning seems to infer that there is, indeed, "an unannounced and highly confidential Apple product" that Apple wishes to protect.

The letter, from the Menlo Park, California law firm of Orick, Harrington, and Sutcliffe, goes on to note: "While Apple values and appreciates vibrant public commentary about its products, we believe you and your company have crossed the line by offering a bounty for theft of Apple's trade secrets. Such an offer is illegal and Apple insists that you immediately discontinue the Scavenger Hunt."

Gawker is taking the threat in good humor, however, congratulating the lawyer who sent it for providing "the most concrete evidence (from Apple itself, no less!) yet that there may indeed be a tablet in the works."

And although the lawyer didn't win the Scavenger Hunt's $100,000 grand prize, to be granted to the worthy who provides an Apple tablet to the Gawkers and lets them "play with it for one hour," he's not walking away empty-handed. To show their appreciation, the Valleywags are sending him a DVD of Legally Blonde 2, a $25 Zune Marketplace giftcard, and "a fabulous set of steak knives!" ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.