Feeds

CyanogenMod 7.1 brings 24 Android phones into fold

Custom firmware updated

Choosing a cloud hosting partner with confidence

Android smartphone owners, rejoice! CyanogenMod, one of the better custom phone firmware offerings has been updated, adding support for 24 more handsets.

The list of added phones includes key recent releases from Sony Ericsson, Samsung, Motorola and HTC:

  • HTC Desire S
  • HTC Incredible S
  • HTC Incredible 2
  • LG Optimus 2X and T-Mobile G2x
  • Motorola Backflip (Motus)
  • Motorola Cliq / Cliq XT
  • Motorola Defy
  • Motorola Droid 2
  • Motorola Droid X
  • Samsung Captivate
  • Samsung Fascinate
  • Samsung Mesmerize
  • Samsung Showcase
  • Samsung Vibrant
  • Samsung Galaxy S
  • Samsung Galaxy S2 (multiple carriers)
  • Sony Ericsson Xperia X8
  • Sony Ericsson Xperia Mini
  • Sony Ericsson Xperia Mini Pro
  • Sony Ericsson Xperia Neo
  • Sony Ericsson Xperia Play
  • Sony Ericsson Xperia Ray
  • Sony Ericsson Xperia Arc
  • ZTE V9

CyanogenMod 7.1's coders also said the update includes pre-complete beta support for many other devices, including the LG Optimus 3D and the HP TouchPad tablet.

The team said the best way to install the software - widely prasied for its ability to rid phones of the apps and branding imposed by network operators - is through the ROM Manager tool, but it can also be downloaded separately. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.