Feeds

Samsung sheds light on low-cost WinPho blower

Tile be back

Remote control for virtualized desktops

Samsung announced its latest offering based on the Windows Phone platform today, the Omnia M, a low-end alternative for those who want Microsoft's tile UI, but don't fancy one of Nokia's budget Lumia.

Samsung Omnia M

The Samsung Omnia M features a 1GHz processor and just 384MB of Ram. That actually means it's less powerful than the Lumia 710, not even matching the limited brawn of HTC's Radar.

Still, there is a generously-sized 4in OLED display, a 5Mp rear-facing camera and a 0.3Mp webcam so users can jump on the company's ChatOn communication service.

There's 4GB of internal storage, with the firm touting additional space through Microsoft's SkyDrive sync'n'store service, which offers 25GB of free cloud capacity.

Samsung Omnia M

Other multimedia features include the Samsung AllShare for flinging content to a telly, a Photo Studio for image editing and the Music Hub, which will create playlists to suit your mood. How exhilarating.

The Samsung Omnia M hits Europe sometime soon although exact pricing and availability have yet to be revealed. ®

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.