Feeds

Galaxy Nexus audio bug patched... unofficially

Beta code from Samsung, Google leaked

Remote control for virtualized desktops

Owners of the Samsung Galaxy Nexus Android 4.0 Ice Cream Sandwich smartphone awaiting the official fix for the handset's spontaneous volume reduction bug may want to avail themselves of an unofficial fix in the meantime.

Courtesy of one of the founders of the MoDaCo forum, the release, which hasn't been sanctioned by either Google or Samsung, nonetheless purports to be their code, but still in the internal testing phase.

The patch requires a handset with an unlocked bootloader. Put the handset into bootloader mode and then a set of scripts for Windows, Mac and Linux operating systems handles the rest.

The sound glitch sees the handset drop the audio volume of its own accord. The phone goes suddenly silent, without warning. Not every handset appears to be affected, but the consensus is that the bug only makes its presence felt when the Galaxy Nexus is operating in the 900MHz band for 2G communications.

MoDaCo is also hosting test code that ups the brightness of the screen when the backlight is set to auto. It also has a kit for rooting the device through a tweaked boot image. ®

Intelligent flash storage arrays

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.