Feeds

It's JUST possible, but Apple MIGHT not make an iWatch in 2013

And if it did, it just might be Rather Dull

Choosing a cloud hosting partner with confidence

What's better than smartphone that is not strapped to your wrist? A smartphone that IS strapped to your wrist.

In what is a strange rumour even by the standards of supply chain rumours - Chinese manufacturing news site iPhone.TGBUS says that Apple is planning to release a watch in 2013, and the story has been widely circulated.

Citing supply chain manufacturers, the site says that the iPad-makers have commissioned parts for a 1.5-inch OLED screen watch with bluetooth, an Intel chip, a SIM card, apps and Siri control. The putative iWatch would be able to interact with a coupled iPhone and will be out in the next six months, claims the site.

Going by that feature list - if Apple did go ahead with this product, it would be doing little more than adding a SIM card and a strap to its watch-sized iPod Nano. We hope they'll be aiming higher than that in 2013.

It's already possible to buy armbands and watchbands for iPhone and iPods.

Wearable computing will could conceivably be a big trend next year but here on the Reg vapourware desk we're hoping for graphene T-shirts and augmented-reality hats rather than wrist-phones. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.