Feeds

Samsung demos amazing folding phone

Interior OLED screen folds in half

Security for virtualized datacentres

A video has appeared online of what’s claimed to be an OLED display able to fold itself in half to become a mobile phone.

Can't see the video? Download Flash Player from Adobe.com

Initially, the phone - which it’s thought was recently seen on a Samsung stand at a display tech trade show in Japan - looks more like a portable media player because of its large - 5in or so – display.

But suddenly the phone automatically folds itself in half, revealing a secondary – yet much smaller – screen on the opposite side. After a few seconds the device then opens itself up again.

When closed, a Samsung emblem can clearly be seen underneath the smaller screen. A menu of icons can be seen on the smaller screen, suggesting the front panel is touch-sensitive. What appear to be the usual call make and break buttons are also built into the unit’s front.

Official technical specifications haven’t been seen yet, so it’s difficult to say whether the bendy device will ever make it to Blighty.

However, the folding talker could be Samsung’s latest innovation following its recent unveiling of a bendable 4in OLED screen, which the firm displayed last month.

Samsung phone reviews
Innov8 i8510
Omnia i900
U800
Tocco F480
F400

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.