Feeds

Leaked Apple inventory list hints at new non-iOS hardware

Stay of execution for Mac Pro towers rumoured

SANS - Survey on application security programs

Sweat is pouring down fanbois' foreheads today: a leaked inventory list and a stock shortage have sparked rumours of a new Mac Pro emerging at Apple's World Wide Developers Conference.

The Mac Pro desktop tower was last refreshed in August 2010, and the top-specced model is a 12-core £4,083 ($4,999) beast. Such muscle power is well outside the requirements of Apple's slab-fondling, phone-stroking, Angry Birds-hurling user base, so it is feared the maker of iOS-powered gadgets might let its high-end desktop line die out. The Reg's Rik Myslewski noted that combined sales of the Mac Pro, Mac Mini and iMac - all traditional desktops - only contributed $6.4bn to the company's $108bn net sales last year.

However, a shortage of Mac Pro units (Mac Rumours found that only 5 out of 100 US Apple stores had the entry-level model available in store) and an inventory list sent to 9to5Mac suggest that there may be a new Mac Pro model on the way.

The list purportedly shows new fruity stock headed for sale in Australia. The list of order numbers do not seem to match any order numbers for current Apple products but are in the same format. 9to5 infers that the three numbers below show a new Mac Pro is on the way:

  • MD770X/A K5BPLUS,BETTER,BTR-AUS
  • MD771X/A K5BPLUS,BEST,BTR-AUS
  • MD772X/A K5BPLUS,ULTIMATE,BTR-AUS

The Reg knows that the current order number for the Mac Pro is MC915LL/A, but we cannot confirm that the Mac rumour mill's guess is right - or that the document is real. Other helpful whispers suggest that the Mac Pro will get an updated case, possibly featuring a 7-inch retina display screen. That sounds bonkers.

A separate spec sheet running wild on the internet seems to suggest a thinner, more expensive Macbook Pro with an Intel Ivy Bridge chip will be unveiled at WWDC. And other rumours suggest an update to the iMac and to the MacBook Air.

It's five days till the conference on 11 June, when we'll actually be able to find this stuff out, and won't have to keep staring at fuzzy JPGs of spreadsheets. ®

SANS - Survey on application security programs

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.