Feeds

HTC's next-gen Android flagship phone to debut Feb 2010

With or without a Qwerty array?

Internet Security Threat Report 2014

The head of HTC's Swedish operations has said the company will unveil the 'Hero 2' smartphone in February 2010 and ship the Android-based handset soon after.

The gen comes by way of IDG's Swedish-language newssite. According to the executive, one Patrik Andersson, the second-gen Hero will be announced at Mobile World Congress (MWC), a phone trade show that kicks off in Barcelona on 15 February.

Register Hardware will be there, of course.

Andersson didn't say anything about the device's name or about its specifications.

HTC is believed to be working on a handset codenamed 'Passion' - possibly that's its go-to-market name too - which combines Android 2.0 with a 1GHz Qualcomm Snapdragon processor and a 3.5in OLED display.

Passion may be 'Hero 2' or it may not be. Certainly, there's talk that one HTC Android smartphone due to debut at MWC will sport a slide-out Qwerty keyboard, a feature missing from Hero. ®

HTC Handset Reviews
Hero
Touch HD 2
Tattoo
Touch 2

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.