Feeds

LG lifts skirt, reveals watchphone

But don't tell anyone...

Choosing a cloud hosting partner with confidence

CES The wristphone is back, this time courtesy of LG. But while the manufacturer showed off its idea of what such a gadget should look like, there's no guarantee it'll ever come to market.

LG's hush-hush watchphone

LG's watchphone: off the wrist

Locked away behind glass and protected by a pair of minders, six watchphones were on display at the Consumer Electronics Show (CES) in Las Vegas this week. Journos could take pictures; regular punters could not.

LG's hush-hush watchphone
LG's hush-hush watchphone

Marking time?

Consumers won't get a look-in either. “This is just a concept. We have no plans to market it,” one of the LG staffers watching out for the watches insisted.

Alas details were sketchy. What we can say is that the prototypes are based around an OLED display, and are designed to work in partnership with a Bluetooth headset. So there's no Dick Tracy wrist-to-ear usage here. The timepiece is controlled via a trio of buttons and voice commands.

With a range of strap types and colours, and shiny chrome highlights, LG's watchphones are certainly stylish. Come on, LG, get these goodies out of the case and into the High Street.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.