Feeds

Steve Jobs snuffs App-Store-for-Mac rumor

That would be a 'nope'

Security for virtualized datacentres

Mac OS X users won't be limited to Apple-approved apps as are users of the iPhone, iPad, and iPod touch. So says no lesser light than Steve Jobs himself.

Last Friday, a rumor zipped across the interwebs that the next version of Mac OS X - which will be version 10.7 - would institute an App Storesque "gated community" in which only Apple-blessed software would run on Macs updated to that as-yet-unnamed follow-on to 10.6, aka Snow Leopard.

That rumor, first reported by the programmers' consortium Rixstep, was immediately debunked by a developer who pointed out to 9to5Mac that Rixstep's fears of restrictive code signatures were unfounded.

But rumors have legs, whether they're based on reality or not. So one developer decided to check with The Man himself, sending the recently oh-so-reponsive Jobs a personal email asking: "There's a rumor saying there will be a Mac App Store and no software without authorization from Apple will run on Mac OS X. Is that true?"

According to Redmond Pie, Jobs responded in characteristically concise fashion: "Nope."

The email header, as published by Redmond Pie, appears authentic, so it seems that Mac OS X users can now relax. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.