Feeds
90%

Apple iPhone

May return it

Remote control for virtualized desktops

Key specs

  • Dimensions: 11.5 x 6.1 x 1.16cm
  • Weight: 135g
  • Capacity: 4GB or 8GB flash drive
  • Display: 3.5inwidescreen multi-touch display
  • Resolution: 480 x 320-pixel at 160 dpi

Mac system requirements

  • Mac computer with USB 2.0 port
  • Mac OS X v10.4.10 or later
  • iTunes 7.3 or later

Windows system requirements

  • PC with USB 2.0 port
  • Windows Vista Home Premium, Business, Enterprise, or Ultimate Edition; or Windows XP Home or Professional with Service Pack 2 or later
  • iTunes 7.3 or later
  • GSM: Quad-band (850, 900, 1800, 1900 MHz)

Wireless data

  • Wi-Fi (802.11b/g)
  • EDGE
  • Bluetooth 2.0+EDR
  • Camera: 2.0 megapixels

Power and battery (claimed)

  • Built-in rechargeable lithium ion battery
  • Talk time: Up to 8 hours
  • Standby time: Up to 250 hours
  • Internet use: Up to 6 hours
  • Video playback: Up to 7 hours
  • Audio playback: Up to 24 hours

Remote control for virtualized desktops

90%

Apple iPhone

The iPhone is so much fun - and irritating - because it's such a departure from what's come before...
Price: $499 (4GB); $599 (8GB) RRP

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.