Feeds

BlackBerry OS 10.1 leaks its secret goo over all the web

Half-baked next version to try, if you're mad enough

Providing a secure and efficient Helpdesk

A work-in-progress build of the next BlackBerry OS, version 10.1, has leaked onto the interwebs.

This latest update is due to ship this month to coincide with the planned launch of the BlackBerry Q10, a touchscreen phone with a QWERTY physical keyboard. This model follows its all-touchscreen cousin the Z10, which went on sale in January and runs BlackBerry OS 10.0. The 10.1 upgrade is not yet available but can be ordered from retailers.

BlackBerry users who have dared to reprogram their expensive Z10s with the leaked work-in-progress "v.10.1.0.1429" operating system - and thereby risked bricking them completely - report performance improvements and a wide range of usability changes.

However the absence of some applications suggests this release is in an early stage of development.

The camera software has had some work done: it now has a High Dynamic Range (HDR) option and closer integration with the picture editor. The web browser, onscreen keyboard (believed to be licensed from SwiftKey), and text editing have also received some attention. Custom alerts, just one of many long-standing BlackBerry OS features missing from BB10, returns. The Android runtime has also been tweaked; the Z10 runs a number of Android binaries natively.

The leak is discussed in this low signal-to-noise ratio thread here.

All but the most rabid BlackBurgers are advised to steer clear and wait for the official release, which can't be too far away. There's much breakage, and also a high chance of bricking your device if you choose to hunt down the leaked update and install it.

After BlackBerry delayed the launch of BB10, the software was still in a pretty raw state on the first Z10s. But subsequent over-the-air updates have seen small but significant fixes to power consumption and reliability. The rate at which the operating system's developers are incorporating suggestions and bashing out releases is impressive. ®

Protecting against web application threats using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.