Feeds

Xperia X2 delayed until 2010

Sony Ericsson admits phone's faults

Choosing a cloud hosting partner with confidence

The Xperia X2 smartphone won’t now launch this year, Sony Ericsson has admitted.

The X2 was supposed to go live during Q4 2009, or so SE told Register Hardware back in September when the high-end handset was first demoed in public.

However, a post onto the official Xperia blog has since confirmed that “the X2 is going to be delayed until January [2010]” – the first week of which, to be specific.

Mobile phone firms don’t usually admit much when their high-end handsets miss scheduled launch dates, but SE confessed that the X2 “threw up a few issues” when trying to integrate the smartphone with some network applications.

A few “minor tweaks”, such as extending the X2’s battery life and speeding up aspects of the phone’s software, also need to be performed before the handset can be released, SE added.

The Xperia X2 will run Windows Mobile 6.5 and features an 8.1Mp camera alongside a “real 3D panel” of controls in various applications. The phone supports quad-band GSM and 3G connections. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.