Feeds

Top-secret Android handset surfaces on YouTube

A rare moment of openness for Google's open OS

Boost IT visibility and business value

Defying Google's pathologically closed approach to its open mobile platform, someone has posted video of a top-secret Android phone to YouTube.

The video's a bit blurry. And even if it wasn't, it wouldn't tell you much. But if you want a glimpse of the current Android SDK, this is the only way to get it. For more than five months, in a display of perverse cruelty, Google has hidden SDK updates from all but a select few mobile developers.

Apparently, this is the HTC Dream - an Android handset under development at Taiwenese-based manufacturer High Tech Computer. Word is that this will be the first Android device to market sometime later this year.

When he demoed Android at Google's San Francisco developer conference in late May, engineering director Steve Horowitz was likely handling an earlier version of the Dream. You can see it on YouTube too.

The newer video shows off a retractable keyboard. But more importantly, it shows off some rogue developer breaking Google's strict code of secrecy. ®

Bootnote

A tip of the hat to Nicolas Gramlich.

Secure remote control for conventional and virtual desktops

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.