Feeds

Leaked Apple inventory list hints at new non-iOS hardware

Stay of execution for Mac Pro towers rumoured

Secure remote control for conventional and virtual desktops

Sweat is pouring down fanbois' foreheads today: a leaked inventory list and a stock shortage have sparked rumours of a new Mac Pro emerging at Apple's World Wide Developers Conference.

The Mac Pro desktop tower was last refreshed in August 2010, and the top-specced model is a 12-core £4,083 ($4,999) beast. Such muscle power is well outside the requirements of Apple's slab-fondling, phone-stroking, Angry Birds-hurling user base, so it is feared the maker of iOS-powered gadgets might let its high-end desktop line die out. The Reg's Rik Myslewski noted that combined sales of the Mac Pro, Mac Mini and iMac - all traditional desktops - only contributed $6.4bn to the company's $108bn net sales last year.

However, a shortage of Mac Pro units (Mac Rumours found that only 5 out of 100 US Apple stores had the entry-level model available in store) and an inventory list sent to 9to5Mac suggest that there may be a new Mac Pro model on the way.

The list purportedly shows new fruity stock headed for sale in Australia. The list of order numbers do not seem to match any order numbers for current Apple products but are in the same format. 9to5 infers that the three numbers below show a new Mac Pro is on the way:

  • MD770X/A K5BPLUS,BETTER,BTR-AUS
  • MD771X/A K5BPLUS,BEST,BTR-AUS
  • MD772X/A K5BPLUS,ULTIMATE,BTR-AUS

The Reg knows that the current order number for the Mac Pro is MC915LL/A, but we cannot confirm that the Mac rumour mill's guess is right - or that the document is real. Other helpful whispers suggest that the Mac Pro will get an updated case, possibly featuring a 7-inch retina display screen. That sounds bonkers.

A separate spec sheet running wild on the internet seems to suggest a thinner, more expensive Macbook Pro with an Intel Ivy Bridge chip will be unveiled at WWDC. And other rumours suggest an update to the iMac and to the MacBook Air.

It's five days till the conference on 11 June, when we'll actually be able to find this stuff out, and won't have to keep staring at fuzzy JPGs of spreadsheets. ®

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.