Feeds

iPhone 5 gets iPad 2 chip and souped-up snapper

Insiders blab to Bloomberg

Security for virtualized datacentres

The iPhone 5 rumour mill was in full swing again this morning after further reports suggest the revamp of Apple's tech talker will arrive this September with a more powerful processor and an advanced camera.

It isn't the first time an early-Q3 release has been mentioned. Following several similar whispers, a "previously accurate Apple source" came forth and reiterated the same date a few weeks ago.

Now Bloomberg has added weight to the debate, after speaking with two insiders who also confirmed the predicted release. Apparently, the next iPhone will look like an iPhone 4, but is set to include the iPad 2's A5 processor and an 8Mp camera.

It was claimed that as the device will upgrade to an all-new operating system, iOS 5, the company may cease to guarantee all iOS apps run on older models.

The same source also spoke of a new iPad display with a resolution one-third higher than the that of the iPad 2.

As usual, the insiders failed to clarify which next-gen phone is on the way, so the question still remains: will it be the iPhone 5 or the iPhone 4-something? ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.