Feeds

Apple iPad 3 to sport LTE '4G'

Quad-core CPU too

Security for virtualized datacentres

Apple's upcoming iPad 3 will incorporate LTE connectivity, it has been claimed.

If correct - and since it comes from news agency Bloomberg, quite possibly through a managed leak; common with large, influential US news outlets - it will mark a big step up in the tablet's ability to access data services on the move.

Bloomberg's sources - "three people familiar with the product", as it describes them - also confirm the presence of a 'retina' display "with more pixels on its screen than some HD televisions…[and] pixels small enough to make the images look like printed material".

And, yes, it'll have a quad-core CPU.

Presumably, Apple will continue to offer a Wi-Fi only iPad, so punters in countries where there is no LTE infrastructure - here, for example - can still get hold of the hi-res display and speedy CPU.

Production, claimed one mole, began at the start of January and will ramp up to a peak in February. The tablet will go on sale in March.

Separately, iLounge claims to have been shown an iPad 3 casing during last week's Consumer Electronics Show (CES). Powered down, it looks almost identical to the iPad 2. It's a millimetre thicker and the camera lens is slightly larger. Blink and you'd not be able to tell the two apart. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.