Feeds

Mole talks up Palm Pré... 2

An update to the not-even-out-yet smartphone

Security for virtualized datacentres

Everyone knows salt’s bad for you in large amounts, but you’ll need a fair sized dose if you’re to swallow the latest Palm Pré rumour. But it’s Register Hardware’s duty to report that a second Pré smartphone’s supposedly in the works.

Yes, we know what you’re thinking: 'But the first one’s not even out yet.' But according to some of website TechCrunch’s “better sources”, Palm is “very far along” on Pré Part Deux.

It’s unclear exactly what’s meant by “far along”. Is the firm far along with sketching out the design of the Pré’s successor? Or perhaps it’s far along deciding on how to finance the phone? Who knows.

Nonetheless, the source added that the new Pré will be smaller than its predecessor but it too will run Palm’s WebOS, developed specifically for the Pré.

The source hasn’t leaked anything about the second Pré’s potential communication capabilities or juicy technical features. However, they’ve claimed to know that the phone will appear during the later part of 2009. ®

Check out our Palm Pré Video Guides

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.