G2: This Time on Vodafone
A presentation at the Mobile World Congress in Barcelona revealed that HTC and Vodafone are releasing a G2 phone (a.k.a. HTC Magic) as the successor to HTC and T-Mobile's G1 Android phone. Vodafone claims "exclusive deal" for G2. Where goeth the G3?
Unlike the G1, the HTC Magic shuns the sliding keyboard and thereby becomes a bit slimmer and lighter. The Magic drives per touchscreen, keyboard and the trackball inherited from the G1. Users can find the usual Android/Google features such as browser, Google Maps, Google Mail, Google Search, a YouTube client and a market for further Android tools and applications. The mobile phone has GPS, a 3.2-MPixel camera and WiFi (see technical data).
The HTC Magic will be available from Vodafone initially in Germany, then Spain, Great Britain and France. In Italy, the device will be decoupled from Vodafone. Other markets will soon follow. Whether it has to do with market studies or availability, in any case the devices will come in white in France, Spain and Britain, black in Germany, and both colors in Italy. Prices and tariffs are still undetermined.
Technical Data for HTC Magic: Processor: Qualcomm MSM7201a at 528 MHz
- ROM: 512 MBytes
- RAM: 192 MBytes
- Dimensions: 113 x 55 x 13.65 mm
- Weight: 119 Gramm mit Akku
- Display: 3.2-Zoll-Touchscreen at 320x480 pixels
- GPS: internal
- Net: GSM/GPRS/EDGE, Quadband 850/900/1800/1900 MHz
- Net: HSDPA/WCDMA (up to 2 Mbps upstream and 7.2 Mbps downstream)
- Ports: Bluetooth 2.0, WiFI 802.11 b/g, Mini-USB 2.0, Audio
- Camera: 3.2 Megapixels with Autofocus
- Audio format: AAC, AAC+, AMR-NB, MP3, WMA, WAV, AAC-LC, MIDI, OGG
- Video format: MP4, 3GP
- Battery: Lithium-Ion, 1340 mAh
- External drives: Micro-SD
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm