Feeds

HTC Ice Cream Sandwich updates slip to late March

And an even longer wait for some handsets

Choosing a cloud hosting partner with confidence

HTC smartphone owners: you should be getting Android 4.0 Ice Cream Sandwich updates at the end of next month - if you have an unlocked Sensation or Sensation XE.

That's a little later than anticipated. Back in November 2011, HTC eagerly promised ICS updates would appear "early 2012".

Now, the aforementioned smartphones will get ICS first, followed by the Sensation XL "soon thereafter", HTC said.

If you own an Incredible S, Desire S or Desire HD, you'll have a longer wait: ICS is coming to these phones "later this year", HTC admitted, but promised to clarify release dates and provide upgrade information for other handsets "in the coming weeks".

As we say, this schedule almost certainly applies to phones not tied to a given network operator - handsets that are may take longer to upgrade, if they're given ICS at all.

Google released its ICS code to phone and tablet makers in November 2011. Upgrade release timeframe extensions made not only by HTC but also other Android gadget makers suggests they're having a tougher time adapting the code to their devices than they first thought. ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.