Apple’s most important new phone for years will be called the iPhone X, according to a leak of the company’s latest mobile operating system on Saturday.
Strings of software code inside of the leaked operating system, first detailed by Apple news website 9to5Mac, show the expected three new phones will be called the iPhone 8, iPhone 8 Plus, and iPhone X. App and game developer Steven Troughton- Smith discovered the names in the software and tweeted about it on Saturday.
The iPhone 8 and iPhone 8 Plus are successors to the current iPhone models, while the iPhone X is the premium version with an all-new design, crisper OLED screen, improved cameras, and a 3D facial recognition scanner for unlocking the device.
The "X" in the iPhone's name may be a reference to this model being a special 10th anniversary edition. The iPhone 8 and iPhone 8 Plus will look similar to the iPhone 7 and iPhone 7 Plus, but include faster processors, Bloomberg has reported. The new devices will be unveiled at an event on Tuesday. An Apple spokeswoman declined to comment.
The leak comes not long after Apple accidentally published early HomePod speaker software that provided details on upcoming iPhone features. Apple chief executive Tim Cook has criticised news reports on upcoming iPhones this year, saying the articles dented sales of current models. Still, expectations are running high for a blockbuster holiday season: In a recent survey by RBC Capital Markets, almost two-thirds of respondents said they would buy a new iPhone model sight unseen.
_______________________
Read more:
Most popular mobile phones in UAE, Q2 2017 - in pictures
Apple pulls Iranian apps in response to sanctions
_______________________
The leaked operating system corroborates earlier Bloomberg reports that the premium X device will replace the usual Touch ID fingerprint scanner with a face unlock feature. Apple will call the enhancement Face ID, according to the code. The sensor will also be used for scanning a person's facial expression and converting that into animated emojis for messaging, the code shows. Bloomberg recently reported that the premium model will lack a home button and instead use a series of gestures for controlling the device.
The leaked software also sheds more light on an upcoming version of the Apple Watch that has its own cellular connection (existing models have to be tethered to an iPhone). An Aug. 4 report by Bloomberg described this feature.
The code also includes a photo of the new Watch, with a red button on the side and dots in the middle of the screen to show cellular signal strength. The image and the leaked code indicate the device will be capable of making phone calls without an iPhone in range and that Apple will announce new colors, including a grey ceramic and a new gold tone.
MATCH INFO
Asian Champions League, last 16, first leg:
Al Ain 2 Al Duhail 4
Second leg:
Tuesday, Abdullah bin Khalifa Stadium, Doha. Kick off 7.30pm
Test
Director: S Sashikanth
Cast: Nayanthara, Siddharth, Meera Jasmine, R Madhavan
Star rating: 2/5
COMPANY%20PROFILE
%3Cp%3E%3Cstrong%3EName%3A%20%3C%2Fstrong%3EYango%20Deli%20Tech%0D%3Cbr%3E%3Cstrong%3EBased%3A%20%3C%2Fstrong%3EUAE%0D%3Cbr%3E%3Cstrong%3ELaunch%20year%3A%20%3C%2Fstrong%3E2022%0D%3Cbr%3E%3Cstrong%3ESector%3A%20%3C%2Fstrong%3ERetail%20SaaS%0D%3Cbr%3E%3Cstrong%3EFunding%3A%20%3C%2Fstrong%3ESelf%20funded%0D%3Cbr%3E%3C%2Fp%3E%0A
The Sand Castle
Director: Matty Brown
Stars: Nadine Labaki, Ziad Bakri, Zain Al Rafeea, Riman Al Rafeea
Rating: 2.5/5
UAE currency: the story behind the money in your pockets
Key facilities
- Olympic-size swimming pool with a split bulkhead for multi-use configurations, including water polo and 50m/25m training lanes
- Premier League-standard football pitch
- 400m Olympic running track
- NBA-spec basketball court with auditorium
- 600-seat auditorium
- Spaces for historical and cultural exploration
- An elevated football field that doubles as a helipad
- Specialist robotics and science laboratories
- AR and VR-enabled learning centres
- Disruption Lab and Research Centre for developing entrepreneurial skills
Director: Laxman Utekar
Cast: Vicky Kaushal, Akshaye Khanna, Diana Penty, Vineet Kumar Singh, Rashmika Mandanna
Rating: 1/5
Dust and sand storms compared
Sand storm
- Particle size: Larger, heavier sand grains
- Visibility: Often dramatic with thick "walls" of sand
- Duration: Short-lived, typically localised
- Travel distance: Limited
- Source: Open desert areas with strong winds
Dust storm
- Particle size: Much finer, lightweight particles
- Visibility: Hazy skies but less intense
- Duration: Can linger for days
- Travel distance: Long-range, up to thousands of kilometres
- Source: Can be carried from distant regions
Diriyah%20project%20at%20a%20glance
%3Cp%3E-%20Diriyah%E2%80%99s%201.9km%20King%20Salman%20Boulevard%2C%20a%20Parisian%20Champs-Elysees-inspired%20avenue%2C%20is%20scheduled%20for%20completion%20in%202028%0D%3Cbr%3E-%20The%20Royal%20Diriyah%20Opera%20House%20is%20expected%20to%20be%20completed%20in%20four%20years%0D%3Cbr%3E-%20Diriyah%E2%80%99s%20first%20of%2042%20hotels%2C%20the%20Bab%20Samhan%20hotel%2C%20will%20open%20in%20the%20first%20quarter%20of%202024%0D%3Cbr%3E-%20On%20completion%20in%202030%2C%20the%20Diriyah%20project%20is%20forecast%20to%20accommodate%20more%20than%20100%2C000%20people%0D%3Cbr%3E-%20The%20%2463.2%20billion%20Diriyah%20project%20will%20contribute%20%247.2%20billion%20to%20the%20kingdom%E2%80%99s%20GDP%0D%3Cbr%3E-%20It%20will%20create%20more%20than%20178%2C000%20jobs%20and%20aims%20to%20attract%20more%20than%2050%20million%20visits%20a%20year%0D%3Cbr%3E-%20About%202%2C000%20people%20work%20for%20the%20Diriyah%20Company%2C%20with%20more%20than%2086%20per%20cent%20being%20Saudi%20citizens%0D%3C%2Fp%3E%0A
BIGGEST CYBER SECURITY INCIDENTS IN RECENT TIMES
SolarWinds supply chain attack: Came to light in December 2020 but had taken root for several months, compromising major tech companies, governments and its entities
Microsoft Exchange server exploitation: March 2021; attackers used a vulnerability to steal emails
Kaseya attack: July 2021; ransomware hit perpetrated REvil, resulting in severe downtime for more than 1,000 companies
Log4j breach: December 2021; attackers exploited the Java-written code to inflitrate businesses and governments