Feeds

Dell denies dPhone debut

Concept design demo'd at China Mobile event, apparently

Choosing a cloud hosting partner with confidence

The Mini 3i Android-based mobile phone Dell showed off at a China Mobile even this past weekend was merely a proof of concept device, the company has claimed.

Handy, that, because it means Dell may yet feel then need to change the handset's specifications. Reports from the event confirmed previous claims that the phone lacks both 3G and Wi-Fi connectivity, absences that have drawn snorts of derision from Register Hardware commenters.

dell_mini_3i_01

Dell's Mini 3i... er... concept handset

The 3i's Chinese audience may be more forgiving, but Dell insisted to PC Magazine that the phone's appearance was not official and that the handset's details - 3.5in, 360 x 640 screen, 3Mp camera, 2.5G connectivity - were not confirmed.

"The only thing that we're confirming is that we're in product development with China Mobile," a spokesman said. "We were there as a development partner for the oPhone platform."

oPhone is derived from Android, so that's one thing we can be sure of... ®

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.