Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

iPhone 13 could be completely buttonless. What Apple might do instead – Edit Thr

Home Forums General Chat General Discussion iPhone 13 could be completely buttonless. What Apple might do instead – Edit Thr

Tagged: 

Viewing 2 posts - 1 through 2 (of 2 total)
  • Author
    Posts

  • sumonmsh01
    Participant
    #658433

    Rumor has it that a future iPhone (iPhone 13?) might lack physical buttons. A recent US patent application spotted by Apple Insider suggests the company is investigating “capacitive sensing input devices”. Apparently these input devices, aka buttons, will be “invisible backlit holes” that appear when touched and disappear when not in use.

    This approach sounds pretty slick and will no doubt add a bit of elegance if applied to any device. The big question is whether a feature like this will find its way into the next iteration of the iPhone, or if we have to wait until 2022 or beyond in order to see Apple integrate it. It’s not an entirely wild concept and fits with other possible changes Apple may make to future iPhones.


    deandria016
    Participant
    #659107

    Auf Burning Series kannst du die Simpsons und zahlreiche weitere Serien kostenlos online sehen! Wir bieten dir mehr als 5000 verschiedene Serien an, darunter auch How I Met Your Mother, The Big Bang Theory und Two and a Half Men. Burning Series

    • This reply was modified 2 months, 3 weeks ago by deandria016.
Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: