Feeds

Apple 4 Verizon. True

iPhone coming to second US network

Choosing a cloud hosting partner with confidence

Updated It's official: Apple's iPhone 4 will be available on US carrier Verizon's network on 10 February.

Tweaked for CDMA - all the others use GSM - the handset will be priced at $200 for the 16GB model and $300 for the 32GB version. Verizon subscribers can order ahead of the rush, on 3 February.

Unique to Verizon's iPhone: 3G Mobile Hotspot, an app that allows the iPhone to operate as a wireless router, with internet traffic sent out over Verizon's network. Up to five gadgets can connect to the handset this way.

Whether the same app will be delivered through an OS update or App Store download to existing iPhone owners isn't known. The limitations already placed on using the iPhone as a tethered 3G modem suggest not.

And official snaps suggest a redesigned antenna layout:

Verizon iPhone

Verizon iPhone (left) and the others (right)

Simply a result of the switch from GSM to CDMA? An attempt to solve the 'grip of death' problem the original iPhone 4 suffered from? Both?

Initial shots of the new handset also suggest there's no Sim slot. Has Apple indeed opted for a built-in Sim, as has been suggested for the iPad? ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.