Feeds

Leaked Apple inventory list hints at new non-iOS hardware

Stay of execution for Mac Pro towers rumoured

High performance access to file storage

Sweat is pouring down fanbois' foreheads today: a leaked inventory list and a stock shortage have sparked rumours of a new Mac Pro emerging at Apple's World Wide Developers Conference.

The Mac Pro desktop tower was last refreshed in August 2010, and the top-specced model is a 12-core £4,083 ($4,999) beast. Such muscle power is well outside the requirements of Apple's slab-fondling, phone-stroking, Angry Birds-hurling user base, so it is feared the maker of iOS-powered gadgets might let its high-end desktop line die out. The Reg's Rik Myslewski noted that combined sales of the Mac Pro, Mac Mini and iMac - all traditional desktops - only contributed $6.4bn to the company's $108bn net sales last year.

However, a shortage of Mac Pro units (Mac Rumours found that only 5 out of 100 US Apple stores had the entry-level model available in store) and an inventory list sent to 9to5Mac suggest that there may be a new Mac Pro model on the way.

The list purportedly shows new fruity stock headed for sale in Australia. The list of order numbers do not seem to match any order numbers for current Apple products but are in the same format. 9to5 infers that the three numbers below show a new Mac Pro is on the way:

  • MD770X/A K5BPLUS,BETTER,BTR-AUS
  • MD771X/A K5BPLUS,BEST,BTR-AUS
  • MD772X/A K5BPLUS,ULTIMATE,BTR-AUS

The Reg knows that the current order number for the Mac Pro is MC915LL/A, but we cannot confirm that the Mac rumour mill's guess is right - or that the document is real. Other helpful whispers suggest that the Mac Pro will get an updated case, possibly featuring a 7-inch retina display screen. That sounds bonkers.

A separate spec sheet running wild on the internet seems to suggest a thinner, more expensive Macbook Pro with an Intel Ivy Bridge chip will be unveiled at WWDC. And other rumours suggest an update to the iMac and to the MacBook Air.

It's five days till the conference on 11 June, when we'll actually be able to find this stuff out, and won't have to keep staring at fuzzy JPGs of spreadsheets. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.