Feeds

Samsung's translucent OLED finds home in MP3 player

Warning, gimmick approaching

Business security measures using SSL

CES 2010 Samsung has shown off IceTouch, the first ever MP3 player to sport a see-through screen.

It's a total gimmick, of course, but an amusing one. It's fun - once, at least - to turn it around and look at all the menus written backwards. Likewise, peering past the 'Now Playing' screen to what's in front of you.

Samsung IceTouch

Cute, but what's the point?

We can't see much point to it otherwise, but at least the IceTouch has a decent enough media player spec: 16GB of Flash storage; the display is a 2in full-colour OLED panel; decent codec support including Flac, Ogg and MP3HD; video support that takes in MPEG 4, WMV, H.264, Xvid and DivX; an integrated FM tuner; and Samsung's 5.1-channel sound enhancement tech.

Samsung IceTouch

View the menus...

The company also pledged that the IceTouch "continually analyses and adjusts audio levels to reflect the producer’s intended sound". How it knows what a given producer intended remains a mystery...

Samsung IceTouch

...either way round

The IceTouch - aka the YP-H1 - will go on sale sometime during the first half of 2010. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.