Feeds
75%
Motorola Xoom 2 10in Android tablet

Motorola Xoom 2 10in Android tablet

Creaky tweaky?

  • alert
  • submit to reddit

3 Big data security analytics techniques

Review Motorola’s Xoom was the first Android 3.0 Honeycomb tablet to hit the shelves, and now little more than six months after its April 2011 debut, a second-generation machine called - you guessed it - the Xoom 2 is upon us.

The new Xoom is available in two forms: one with a 10.1in screen, like its predecessor, and one with a 8.2in panel called the Media Edition. I’m writing this on the former - Reg Hardware will be reviewing the smaller model shortly.

Motorola Xoom 2 10in Android tablet

Out with Apple-antagonising rounded corners...

At first glance, the new ten-incher is rather impressive. Motorola’s design department clearly has the hots for the bevel - it was the signature styling feature of the recently released Razr and now the same little chamfers have shown up at the four corners of the Xoom 2.

As well as providing a family resemblance, perhaps the idea is to take out some insurance against Apple’s increasingly hubristic legal activities. So, no round corners here.

Motorola Xoom 2 10in Android tablet

...and in with angled edges

While a gnat’s whisker wider and taller than the first Xoom, the new machine is just over 4mm thinner and a not inconsiderable 131g lighter. The tapered sides - in landscape - make it an easier hold than the original, while the rubberised power and volume buttons on the right side but round on the back of the device fall easily to hand.

Like the Razr, the Xoom’s internal and external components are covered with what Motorola calls "splash guard", which seals the the device from, well, splashes or a light rainfall. I couldn’t think of a way to test this that didn’t run the risk of ruining my review unit so it’s something I’ll have to take on trust.

Motorola Xoom 2 10in Android tablet

Happy for you to type in the rain, apparently

A feature of the design that really gets my goat is the positioning of the micro USB and mini HDMI ports on the long edge of the device. Just the right place to get pulled out or even damaged if you are resting the thing in your lap while it’s charging. Samsung is guilty of this same lunacy with its Galaxy Tab 10.1.

SANS - Survey on application security programs

Next page: Slightly quicker

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.