Feeds

Dual-dock prototype iPad eyed on eBay

Own a piece of history

Choosing a cloud hosting partner with confidence

Some time back, an Apple was granted a patent which showed an iPad with two dock connectors, allowing the device to be docked in either landscape or portrait mode.

It was claimed back then that Apple was planning to add the second dock connector to a second-generation iPad. It never did, of course, and it now turns out that the two connectors were actually considered at one point for the first-generation model.

Dual-dock iPad prototype

A prototype of which has now appeared for auction on eBay.

The device, which contains 16GB of Flash storage and runs a crude UI dubbed SwitchBoard - the iPad's current UI is SpringBoard - does indeed sport two dock connector, both of which are fully functional, the seller claims.

Dual-dock iPad prototype

Which is more than you can say for the touchscreen, disabled by Apple, apparently. The battery has been replaced too.

It can be yours for an up-front payment of $10,000 - or you bid as high as you wish: it had reached $4800, at the time of writing. The auction ends tomorrow morning, at just after 5am UK time. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.