Feeds

BlackBerry Storm 2 demo'd on web

'Odin' follows 'Thunder'

The Power of One Brief: Top reasons to choose HP BladeSystem

A video has appeared online in which a second-generation Blackberry Storm is apparently demonstrated.

Can't see the video? Download Flash Player from Adobe.com

Research in Motion (Rim) has already confirmed plans for a Storm 2. The model shown in the video is numbered the 9550 and codenamed 'Odin'.

The Storm was codenamed 'Thunder' - or possibly 'Thor', maintaining the Viking pantheonic theme - and was model number 9500.

While the demo'd 9550 is a pre-production sample, the video states that the final model will sport Wi-Fi connectivity, a feature lacking on the original Storm.

Rim doesn’t appear to have changed the Storm’s physical design much between the two generations, but the video stresses that the 9550 “feels nicer in the hand” and has “better battery door integration”.

The 9550’s glass screen can still be pressed/clicked downwards and only small amounts of light leak from between the display and phone case, which suggests that Rim’s tightened the Storm’s physical shape ever so slightly.

The video’s run-through of the 9550’s technical features also reveals that the prototype runs BlackBerry OS 5.1. A shot of the phone’s memory settings shows that it has 1.8GB of total device memory and support for external memory cards.

Overall, the Blackberry 9550 is “really an evolution of the original Storm”, the video concludes. It’s claimed that the phone will be available towards the end of this year. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.