Home Your Tech Mobility Are there cracks in the iPad facade?

So very soon after the launch of the iPad, we are already seeing problems with the platform.  They seem to dislike the summer's heat and they are leaking personal information via AT&T.

A large number of reports are emerging that iPads seem to have problems being outside on a warm day.

More annoyingly, the effect seems to be entirely random - some units are happy in the heat, others will shutdown very quickly.  In all cases, the shut down is entirely graceful - a warning screen will pop up with a loud banner screen saying "Temperature.  iPad needs to cool down before you can use it."

Reading the discussion board, there seems to be a very wide variety in the temperatures at which the effect is seen - some posters seem to indicate that the shutdown occurs at not much more than room temperature; others at much higher temperatures, if at all.

Some have suggested that the iPad ought to be able to dissipate heat very effectively; after-all its entire back panel is a large block of metal which ought to act as a heat sink.  Unfortunately, if the processor is not thermally bonded to the metal, it will do no such thing.

Cynics have observed that Apple have subtly assisted users to NOT use their iPads outside by keeping the brightness of the unit low enough that it cannot easily be viewed in bright sunlight!

While being kept out of the sun is a good thing, (so far) 114,000 users on the iPad on the AT&T network in the United States have discovered that a security flaw in the connectivity implementation has exposed their names and email addresses to a group of hackers.

"So what," most would say.  However it would appear that those exposed include White House officials; the chief executives of the New York Times, Dow Jones, Time and Bloomberg; and also members of NASA, the US military and the Dept of Justice.

The leaked data was provided to Gizmodo and according to their report the entire iPad user database was exposed, just waiting for an enterprising hacker to find and collect; the list of 114,000 entries was described as only a sample of the entire dataset obtained by the hackers.

It would seem that little has been done with the data - perhaps it is now regarded as too 'hot' to use (especially in the sun!); there have been no reports of increased spam or other unwanted traffic to the email addresses (although self-reporting is a notoriously poor measure of anything).

So much for the 'perfect' device that Steve Jobs presented to the world those few short months ago.  The halo's resistance to gravity seems to be waning and cracks in the ultra-smooth facade are appearing.


As one of the world’s largest social networking services, Facebook handles a lot of user information, and requires input from an astounding range of stakeholders 24 hours a day, 7 days a week — from both inside and outside the business.

Discover how Facebook was helped to connect remote employees, vendors, consultants, and partners to applications and web services quickly and reliably - without risking sensitive data.



Explore your Network Treasure Trove to get the IT Budget you want

With Australian businesses projected to spend over $78.7 Billion why does it feel like you can never get the budget you need?.

In most cases your budget will get approved because the proposals are not only technically correct, but also provide good, credible evidence on how the spend aligns with key business objectives.

Did you know that your Network Monitoring tool can help you build a comprehensive business case without an MBA?



David Heath

joomla statistics

David Heath has over 25 years experience in the IT industry, specializing particularly in customer support, security and computer networking. Heath has worked previously as head of IT for The Television Shopping Network, as the network and desktop manager for Armstrong Jones (a major funds management organization) and has consulted into various Australian federal government agencies (including the Department of Immigration and the Australian Bureau of Criminal Intelligence). He has also served on various state, national and international committees for Novell Users International; he was also the organising chairman for the 1994 Novell Users' Conference in Brisbane. Heath is currently employed as an Instructional Designer, building technical training courses for industrial process control systems.






Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities