Feeds

Apple shutters store as fanbois camp out on virtual pavement

Feast your eyes on Post-it of destiny

Remote control for virtualized desktops

Apple has pulled the plug on its online store, flagging up to he world that it is about to unleash something new and magical and revolutionary on the world.

steve_jobs_ipad

Or it's simply clearing the virtual shelves for the iPad 2 later today.

Visitors to the site are currently being met with the mystic "We'll be back soon" virtual Post-it note.

Which is a red rag to the herds of Apple fans ready to hand over cash for whatever it is Apple – and maybe even Steve Jobs himself – is going to unwrap today.

The big one is the iPad 2 of course. At least until some spoilsport suggested the one to watch for is the iPad 3 in the autumn, which will be "one to make a song and dance about".

Other tips include some kind of repackaging of MobileMe, which may or may not include a cloudy iTunes service. The $99 annual MobileMe package has lately disappeared off both real and virtual shelves.

Anyone expecting Thunderbolts may be disappointed – Apple slipped that one out last week. ®

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.