Feeds

REVEALED: Samsung Galaxy S III is a PHONE

Looks like one. Smells like one

The Power of One Brief: Top reasons to choose HP BladeSystem

Samsung formally unveils its Galaxy S III device later this week, but already the blogosphere is alive with rumours that the gadget will be some sort of phone.

Literally hundreds of people have clicked on links to stories showing pictures of what is clearly a phone with the word 'Samsung' written on it and the words 'Galaxy S III' in the headline, confirming the South Korean giant's next handset will be a phone.

"I have never seen a Samsung phone before," lied one link-clicker. "I never expected it to be oblong with a big touchscreen and the maker's mark on the front. Thank goodness we have these photos to put us on the right track."

Said another: "I knew Samsung was producing a new phone - well, what else would a phone maker do? - but I'm really glad to learn that this phone looks like all the other touchscreen phones out there.

"I was worried Samsung might put 'LG' or 'HTC' or 'Motorola' or 'Sony' on the front, but these pictures, from the blurry early snaps to allegedly leaked press shots, show me that's not the case. Phew."

Many readers expressed fears that the incoming handset might look "like a TV" or "a giant pea".

One said: "All the guesswork is over. We know, as we suspected, that Samsung's new phone looks like a phone. We know almost nothing else about it, but after this week's leaks, we can say it looks like a phone.

"I'm really excited." ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.