Feeds

Leaked Apple inventory list hints at new non-iOS hardware

Stay of execution for Mac Pro towers rumoured

Top three mobile application threats

Sweat is pouring down fanbois' foreheads today: a leaked inventory list and a stock shortage have sparked rumours of a new Mac Pro emerging at Apple's World Wide Developers Conference.

The Mac Pro desktop tower was last refreshed in August 2010, and the top-specced model is a 12-core £4,083 ($4,999) beast. Such muscle power is well outside the requirements of Apple's slab-fondling, phone-stroking, Angry Birds-hurling user base, so it is feared the maker of iOS-powered gadgets might let its high-end desktop line die out. The Reg's Rik Myslewski noted that combined sales of the Mac Pro, Mac Mini and iMac - all traditional desktops - only contributed $6.4bn to the company's $108bn net sales last year.

However, a shortage of Mac Pro units (Mac Rumours found that only 5 out of 100 US Apple stores had the entry-level model available in store) and an inventory list sent to 9to5Mac suggest that there may be a new Mac Pro model on the way.

The list purportedly shows new fruity stock headed for sale in Australia. The list of order numbers do not seem to match any order numbers for current Apple products but are in the same format. 9to5 infers that the three numbers below show a new Mac Pro is on the way:

  • MD770X/A K5BPLUS,BETTER,BTR-AUS
  • MD771X/A K5BPLUS,BEST,BTR-AUS
  • MD772X/A K5BPLUS,ULTIMATE,BTR-AUS

The Reg knows that the current order number for the Mac Pro is MC915LL/A, but we cannot confirm that the Mac rumour mill's guess is right - or that the document is real. Other helpful whispers suggest that the Mac Pro will get an updated case, possibly featuring a 7-inch retina display screen. That sounds bonkers.

A separate spec sheet running wild on the internet seems to suggest a thinner, more expensive Macbook Pro with an Intel Ivy Bridge chip will be unveiled at WWDC. And other rumours suggest an update to the iMac and to the MacBook Air.

It's five days till the conference on 11 June, when we'll actually be able to find this stuff out, and won't have to keep staring at fuzzy JPGs of spreadsheets. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.