Feeds

Microsoft's dual-screen booklet shows 'face' on web

Redmond concept artists outdo themselves

The Power of One Infographic

More delicious rumor scraps about Microsoft's not-yet-announced Courier tablet/e-book/Girl Tech Password Journal have been leaked to the web.

The folks at Engadget unveiled some new Courier info from a "trusted" source. At the very least, Courier is shaping to be a collection of fabulous concept art.

If the actual product can do what Microsoft is (not technically) saying, then it could be an iPad killer. But as impressive as the images and accompanying video may be, we'll believe it when it's running on non-CG-rendered hardware.

(The video comes by way of Engadget. Check out more rendered images of the supposed device at the source.)

According to Engadget, the device will feature a dual 7-inch multi-touch capable screen that can operate with both finger and stylus input. The Courier will weigh a little over one pound and measure under an inch thick, and it won't be much bigger than a 5x7-inch photograph when closed, the publication claims.

Contrary to rumors that the device would run a version of Windows 7, the report said Courier runs on the same operating system as the Zune and Windows Phone 7 Series, which presumably means it's based on Windows Embedded CE 6.0. It uses an Nvidia Tegra 2 chip, the report states.

The publication pins the expected launch date some time within Q3 and Q4 of 2010.

Engadget cited the information (as well as video, and image gallery of what looks to created for a Courier publicity drive) as coming from a "trusted source".

The news arrives — we dare not say completely by coincidence — on the same day Apple announced the release date for the Wi-Fi version of the iPad. ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.