Feeds

JCB builds Android blower for brickies

Construction gets tough

Business security measures using SSL

JCB has dabbled with mobile phones before, generally offering rugged handsets with limited capabilities. But with the world cementing interest in smartphones, the company has finally chiselled its first Android blower, the Toughphone Pro-Smart.

JCB Toughphone Pro-Smart

While the digger maker did team with Motorola for a JCB version of the Defy Plus, it ventures into the market alone this time, taking smartphone ruggedness to the max with iP67-rated waterproofing, shock protection, and resistance to both dust and dirt.

Ah, the joys of working on a building site.

The Toughphone Pro-Smart runs Android 2.3 Gingerbread on an 800MHz processor. Fairly standard specs follow, including a 3.2in touchscreen display and 5Mp camera, although with a 2000mAh battery, users should be able to pick up the phone and wolf whistle their friends and family all day.

JCB Toughphone Pro-Smart

If that's something you dig, then the JCB Toughphone Pro-Smart is available unlocked on Clove for £310. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.