Feeds

Googlephone videos uncovered

Nexus One branding revealed

Security for virtualized datacentres

Evidence is mounting that Google’s smartphone will be called the Nexus One, following the appearance of a video showing the phone’s packaging and OS.

Can't see the video? Download Flash Player from Adobe.com

The video was posted onto a blog called The Nexus One – which doesn’t seem to hold any official links with Google – and appears to show the Google handset hovering over a white cardboard box emblazoned with “nexusone” branding.

It’s widely believed that the handset will run version 2.1 of Google’s Android OS and although the video doesn’t confirm this, it does at least show the OS’ famous green Android lurking on the phone’s screen.

Can't see the video? Download Flash Player from Adobe.com

A “Welcome to Nexus One” message also runs below the Android image.

A second Nexus One video on the website also appears to show the smartphone running a weather application, while red, green, yellow and blue lines dart across the phone’s screen in the background.

nexus_one_shot_01

The Googlephone running Google

The website has even promised to “upload many more pictures, videos and [a] review” of the Nexus One over the next few hours. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.