| Nokia's mobile torture chambers Nokia Conversations The hardware reliability tests are aptly called “torture tests” because they VERY rigorously test the durability of the devices. Just to highlight a few of the tests…. We have an automated robot that bends a mobile screen across the middle; ... See all stories on this topic » | Nokia Conversations |
| Verizon denies blocking Google Wallet on Galaxy Nexus, blames hardware SlashGear Verizon has issued a statement today denying claims that it is intentionally blocking support for the Google Wallet mobile payment app on the upcoming Galaxy Nexus. The response comes after a Google spokesperson confirmed yesterday that Verizon's... See all stories on this topic » | SlashGear |
InformationWeek
"The integrated processing, storage, communications, navigation, and orientation functions built into smartphone hardware and software can be leveraged to create far more powerful distributed sensor devices than we use today. ...
See all stories on this topic »NEW from Apricorn: Aegis Secure Key - Advanced USB Secure Flash Drive with PIN ...
PR Newswire (press release)
... tablet or mobile device. The embedded keypad prevents hardware and software key logging attempts to capture your password entered via the host system. Military-grade hardware encryption - All data on the drive is protected in real time using AES ...
See all stories on this topic »
| Apple's Secrets to Success: 10 Factors That Make Its Products Shine eWeek Whereas many companies in the computing and mobile markets offer their ownhardware, but use another firm's software, Apple controls both sides of the coin. By doing so, it can ensure that all its customers get the same experience. ... See all stories on this topic » | eWeek |
Sacramento Bee
By Maxa Technologies www.maxatec-europe.com Maxa Technologies, (Maxatec) specialist distributor of IT hardware, software and services to the Mobile, AIDC and EPOS market sectors has signed a UK distributor agreement with Hoeft & Wessel for the ...
See all stories on this topic »Dark Reading Launches New Mobile Security Tech Center
Dark Reading
... than the rest of the Dark Reading site; it will offer more comprehensive coverage of mobilemalware, portable device security technology, new vulnerabilities in mobile devices, and breaches caused by portable applications, hardware, and networks. ...
See all stories on this topic »The very best smartphones of 2011
Know Your Mobile
But it wasn't just hardware that impressed. Services and bolted-on features, as well as design language, played a big part in this year's range of market-leading devices. We've reviewed all the big players, from the iPhone 4S to the LG Optimus 3D, ...
See all stories on this topic »
| Google and Verizon Battle Over Mobile Payments Wired (blog) Google Wallet does not simply access the operating system and basic hardware of our phones like thousands of other applications. Instead, in order to work as architected by Google, Google Wallet needs to be integrated into a new, secure and proprietary ... See all stories on this topic » | Wired (blog) |
Tidak ada komentar:
Posting Komentar