Feeds

Apple to lead fanbois 'Back to the Mac'

Media invited to October 20 event

Top 5 reasons to deploy VMware with Tegile

Next Wednesday, October 20, Apple will host an invitation-only event on its Cupertino campus that is apparently intended to remind its iOS-obsessed fan base that, yes, it still makes personal computers.

Jobs & Co. sent out invitations this Wednesday to a media soirée entitled "Back to the Mac" — and in true Jobsian fashion, that title is all that anyone outside of One Infinite Loop knows for sure.

The graphic used for the invitation, however, is sparking the usual firestorm of speculation:

Apple invitation to October 20 'Back to the Mac' media event

Cheetah, Puma, Jaguar, Panther, Tiger, Leopard, Snow Leopard — now 'Lion'?

The sneak peek at what appears to be a lion's schnozz and peeper, of course, arouses speculation that the next big cat, Mac OS X version 10.7, will be unveiled at the event, and that the release will be called "Lion".

Of course, Jobs could be throwing us all a curve, and the release might actually be called Panthera leo nubica.

The timing is ripe for version 10.7. The current version of Mac OS X, Snow Leopard, was announced at Apple Worldwide Developers Conference in June of 2008, and shipped in August 2009.

Snow Leopard was mostly an under-the-hood upgrade of the previous version, Leopard, which was announced in June 2006, also at WWDC, and shipped in October 2007. It's high time for an update.

This year Apple broke with its Mac OS X announcement tradition when it turned WWDC into a iOS love-fest — so much so that its annual Design Awards handed out at that event didn't even include a Mac OS X category. It's high time that Apple remembered that it provides an operating system other than iOS.

Other possibilities for announcements on October 20 include the rumored upgrade to the languishing MacBook Air and new versions of iLife and iWork.

And then there's that rumored touchscreen iMac, but don't hold your breath in fevered expectation of that possibiloity — and we ain't lion lyin'.

Sorry... ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
Apple's OS X Yosemite slurps UNSAVED docs into iCloud
Docs, email contacts... shhhlooop, up it goes
Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!
Version 12 first major-number Suse release since 2009
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.