Feeds

LG Xenon phone leaked

Take note...

Security for virtualized datacentres

A picture’s emerged online of an upcoming LG phone that's known only as Xenon.

LG_Xenon

LG's Xenon has HSDPA 3G and a "proximity sensor"

Image courtesy of BGR

A source known only as “Daddy G” has told website Boy Genius Report that the phone’s currently undergoing a series of tests by US network operator AT&T and that it should be in the shops by Christmas.

Daddy G’s also revealed most of Xenon’s specifications, the most interesting of which is a proximity sensor. Exactly how this has been put to use in the phone isn’t known, but it's likely the device is used to turn Xenon's screen off when it's held up to your head during a call. The iPhone uses its proximity sensor this way.

Connectivity wise, Xenon’s said to be capable of HSDPA 3G and Wi-Fi connections, in addition to quad-band GSM/GPRS/Edge and Assisted GPS guidance.

The 2.8in LCD can display content both horizontally and vertically. There’s a three-megapixel camera hidden on the rear and it’s reasonable to assume that the snapper will be teamed up with a Xenon flash, given the phone’s name. Content will be stored onto Micro SD cards of up to 16GB and Bluetooth’s on board too.

Since the phone hasn’t been officially announced by LG, a UK specific launch date or price hasn’t been captured yet.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.