Feeds

Tablet maker threatens, then robs Apple

The non-iPad iPad clone

The Power of One Brief: Top reasons to choose HP BladeSystem

The publicity whores at China's Shenzhen Great Loong Brother tablet-PC maker are at it again.

First, they raised a worldwild rumpus by floating the prospect of a lawsuit accusing Apple of stealing the design of their tubby P88 slate for the iPad. Now they've blatantly ripped off the look and feel of Mac OS X, pasted it onto Windows, and installed it on their aforementioned touchscreen tablet.

From the Chinese-centric gadget blog Giz-China comes word - and photos - of the oh-so-subtle "upgrade" to the P88.

Shenzhen Great Loong Brother P88

Logo? Check. Dock? Check. Menu bar items? Check. Icons? Oops, wrong side...

Back when we first reported SGLB's threatened lawsuit, we ridiculed the company's president Wu Xiaolong for saying that the P88 and the iPad were "identical". That must have stung him, as he apparently went immediately to work making the device even more closely resemble a Cupertinian creation.

Shenzhen Great Loong Brother P88

"What shall we call our rip-off of Mac OS X? Hmm... How about 'Mac OS X'?"

Unfortunately, Wu and his minions chose the wrong Apple device, ensuring that the P88 resembles a Mac - not an iPad.

But we've got to hand it to the Wu-ster. He has succeeded in getting another round of free publicity for his company.

Doh! We're such suckers. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.