Feeds

Foxconn churns out '150,000' iPhone 5s a day

22 million by year's end

Security for virtualized datacentres

The word out of Taiwan is that the iPhone 5 is now being churned out of Foxconn Electronics sweatshops factories at a rate of 150,000 per day, and that five to six million of the li'l fellows will be shipped by the end of September.

Not a bad run-rate for a product that has yet even to be announced by Apple – although the recent "iPhone, iPhone, who's got the iPhone?" missing-prototype farce in San Francisco is all the Cupertinian acknowledgement one might need.

The high-volume production report comes from those ever-gabby "industry sources" cited by DigiTimes. According to those same sources, Foxconn will crank out 22 million iPhone 5s in the fourth quarter of this year.

Pegatron Technology will also be contributing iPhones 5s to the mix, but DigTimes sources say that Foxconn will be the sole supplier until 2012, when Pegatron's shipments will kick in.

Exactly when the iPhone 5 will become available hasn't been revealed, but the smart money says expect it during first week of October.

But if you're a Londoner, don't try to be first in line: überfanboi Rob Shoesmith already has you beat. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.