Feeds

It's official: Samsung shows off i8510 8mp cameraphone

Korean company joins cameraphone crème de la crème

Security for virtualized datacentres

Rumours that the South Korean company was going to join the 8mp cameraphone crowd have been circulating for a while, now Samsung has confirmed it's launching the i8510 in the UK in August.

Much like the iPhone, the i8510 comes in 8GB and 16GB variants, with 3G and HSDPA as well as Wi-Fi. It also features GPS and a camera application that automatically geotags photographs with the location where they were taken.

Samsung i8510 8-megapixel cameraphone

Come in iPhone, your time could very well be up

Auto focus, smile shot, blink shot and face recognition are all included with images being displayed on the phone's 2.8in, 16 million colour LCD. Additional storage is available with a microSDHC external memory slot that supports up to 16GB cards.

Unlike Apple's iPhone, it’ll play back DivX, WMV and Real Player video files, plus there’s also support for MPEG4, and 3D surround sound.

The only thing that's missing is a touchscreen, instead it sports a slide-out keypad. Other highlights include Bluetooth, FM radio, music player, DLNA hook-up and a USB slot. Samsung quotes up to 510 minutes talk time and up to 310 hours standby.

Pricing and operator details haven't been announced just yet.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.