Feeds

'iPhone 5' chippery captured on camera

Scaled up to A5

Remote control for virtualized desktops

Another week, another influx of next-gen iPhone rumours and speculation. This time, though, we have images of what appears to be the chipset that'll be used within Apple's upcoming handset.

Is this the iPhone 5 chipset?

The first image - spied on Chinese-language site Weibo - shows off the A5 chip widely expected to be included in Apple's next-gen handset, PhoneArena reports. While the text is a bit blurry, a higher battery capacity can also be noted.

iPhone 4S insides

This was backed up by further pictures that popped up later on Macpost and showed the front side of the device. This clearly shares a similar form factor to the iPhone 4, prompting calls that, if real, this is indeed the iPhone 4S, rather than the iPhone 5.

iPhone 4S insides

Chinese site Pandaxtech posted yet another high res pic of the handset's innards earlier too. Seems pretty genuine. I guess we'll all know for sure when Apple announces the device officially, sometime in October... supposedly. ®

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.