Apple, Android rain on Palm's Pre parade
Could Palm have picked a worse month to launch its saviour device, the Palm Pre? If it wasn't planned that way one could be forgiven for thinking it was. Over the past fortnight there have been so many announcements relating to Android-based devices and to top it all off the week the Pre goes on sale in the US Apple lets fly with the third-generation iPhone.
Palm may have been gazumped by its up-and-coming competitors, but so far the early Pre reviews have been favourable so let's not count it out just yet.
Of course, like the iPhone and Android, the success of the Pre will depend on how well the application ecosystem thrives.
And with Optus stating it will allow its subscribers to use the iPhone 3G S as a mobile broadband modem with “tethering”, you can add carrier support to the success of a new phone as well!
Tethering is one of those applications that falls within the realm of a customer's peceived “rights”. You pay your mobile subscription fee for a set amount of voice and data access – why should that access be restricted to one device?
Thankfully, with the rise of portable USB mobile broadband devices that have “opened up the skies” so to speak to any notebook and netbook, the carriers are becoming more flexible in how the data can be used.
Imagine a fixed-line ISP saying to its customers “you can only use the data access on one PC in your house”.
Now for the other smartphone makers to follow Apple's lead and go to market with phones that support and encourage thethering so customers can get the most out of mobile broadband.
Reports from the US indicate tethering with the Palm Pre will be possible, but in light of Apple's marketing it wouldn't surprise me if any doubts about data sharing promptly disappear.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCSAP DS and BI SpecialistVIC
- CCContract System Analyst (SQL/.net) 160205/SA/561Asia
- FTJava or Ruby Web DeveloperVIC
- FTNetwork Systems LeadVIC
- FTSenior Mobile Developer - IOSNSW
- CCPython Web Developer - DevOPS EnvironmentVIC
- CCWeb Content WriterSA
- FTFront End Developer Required Working World Leading Digital TeamNSW
- CCIBM ESB Developer (Junior to mid level role)NSW
- CCContract System Analyst (MSSQL/.Net/Mobile App) 160122/SA/vhaAsia
- CCAutomation QAVIC
- CCHigh Level Network Engineer (Communications)WA
- FTSenior Performance Test AnalystNSW
- FTJunior Developer | C#, MVC & SQL | Class FinanceNSW
- FTJava Web Development OpportunityVIC
- CCContract Analyst Programmer(Crystal Report/Oracle)160127/AP/vhsAsia
- CCTest ManagerQLD
- CCService Desk ManagerVIC
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- CCSolution Architect - .NET TechnologiesNSW
- CCSAP Business Intelligence SpecialistQLD
- CCPega BPM Developer / Configurer - 12 months contractACT
- CCContract Analyst Programmer 160120/AP/vvtAsia
- FT.NET DeveloperVIC
- CCJava Developer - Front/ Back EndVIC
This whitepaper looks at the security gaps and disconnects in organisations, how network virtualisation can help to reduce risk and support a higher-level security strategy and why micro-segmentation provided through network virtualisation paves the way for implementing a Zero Trust model.
- Senate passes permanent ban on Internet access taxes
- Navy tests first ‘reversible’ clean energy fuel cell storage system
- It's official: Older versions of IE are now at risk
- Google execs defend tax deal to UK legislators
- Project Kratos: AWS Lambda functionality, without Amazon lock-in
- Microsoft expands Windows 10 release notes, but experts want more, much more
- Now your phone can scan documents directly to the cloud with Box Capture
- What's next for IBM’s enterprise social business
- Schneier: terrorists will switch to more secure alternatives to avoid encryption backdoors
- Indegy finds out when industrial controls go bad (think Stuxnet)
- Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking
- Qualcomm bringing LTE connectivity to wearables with new Wear platform
- Qualcomm's new chips target low-cost smartphones with premium features
- House bill would prevent patchwork of state laws banning smartphone encryption
- Facebook withdraws Free Basics from India after regulatory debacle