Feeds

Mythical 'iPad 2' caught on camera

'Dummy' vid

Internet Security Threat Report 2014

There's a smattering of videos YouTubing their way across the web that purport to show the oft-rumored iPad 2 in plain view at last week's Consumer Electronics Show.

The Reg is highly skeptical as to their authenticity, but here are two for your edification and enjoyment:

The videos are purported to be of a dummy case given by Cupertino to an unnamed Chinese iPad-accessory manufacturer so that they could get a jump on creating cases for the device, rumored to appear as early as next month.

Our experience in talking with accessory manufacturers, however – both in the US and in China – has been that they're as in the dark as anyone as to Apple's plans. We have in the past even received furtive phone calls from some major suppliers, asking if we had any inside information about iGadget specs before their release.

We never have – well, there was the Gizmodophone, but that was a fluke – and it's our considered opinion that Apple would have sent a rapid-response legal takedown team to Las Vegas had it caught wind of a prototype case in the wild.

Nothing to see here, we say. Move along, now. ®

Remote control for virtualized desktops

More from The Register

next story
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?