Apple, Android rain on Palm's Pre parade
Could Palm have picked a worse month to launch its saviour device, the Palm Pre? If it wasn't planned that way one could be forgiven for thinking it was. Over the past fortnight there have been so many announcements relating to Android-based devices and to top it all off the week the Pre goes on sale in the US Apple lets fly with the third-generation iPhone.
Palm may have been gazumped by its up-and-coming competitors, but so far the early Pre reviews have been favourable so let's not count it out just yet.
Of course, like the iPhone and Android, the success of the Pre will depend on how well the application ecosystem thrives.
And with Optus stating it will allow its subscribers to use the iPhone 3G S as a mobile broadband modem with “tethering”, you can add carrier support to the success of a new phone as well!
Tethering is one of those applications that falls within the realm of a customer's peceived “rights”. You pay your mobile subscription fee for a set amount of voice and data access – why should that access be restricted to one device?
Thankfully, with the rise of portable USB mobile broadband devices that have “opened up the skies” so to speak to any notebook and netbook, the carriers are becoming more flexible in how the data can be used.
Imagine a fixed-line ISP saying to its customers “you can only use the data access on one PC in your house”.
Now for the other smartphone makers to follow Apple's lead and go to market with phones that support and encourage thethering so customers can get the most out of mobile broadband.
Reports from the US indicate tethering with the Palm Pre will be possible, but in light of Apple's marketing it wouldn't surprise me if any doubts about data sharing promptly disappear.
Incorporating path control in your WAN is a critical first step along the way to deploying a full SD-WAN solution. This whitepaper looks at how you can use dynamic tools to shortcut the complex configurations and expenditures of time and resources to ultimately efficiently utilise the hybrid links that may already be deployed in the network.
This research report explores the importance of security strategy and Cyber Threat Intelligence. The purpose of the study is to understand how companies are using, gathering and analyzing threat intelligence as part of their IT security strategy. Some of the topics covered are: Whether timely, accurate and actionable cyber threat intelligence make a difference in blocking or preventing external attacks. Are companies using cyber threat intelligence effectively to make informed decisions about how to respond to a menace or hazard
- Vodafone switches 4G data to new core network
- Android malware masquerades as Nintendo game emulator
- Lizard Squad hacker draws suspended sentence for online attacks
- Ex Oracle VP takes top Aussie role at Symantec
- Fujitsu unveils Chromebook managed service offering for enterprises
- Defence extends Optus satellite contract until 2020
- Oracle gets September trial date against Rimini Street
- Bluedot Innovation aims for the enterprise
- How getting mobile helped John Holland slash IT costs
- Data center group tightens certification rules for service providers
- An Aussie company is building the world's smallest SDN switch
- Hardcore Hardware: The Origin PC Millennium can show off its three GeForce GTX 980Ti cards from either side
- In Pictures: Hacking Team's hack curated
- In Pictures: HP Pro Slate 8 features magic pen
- Facebook to use all renewable energy in its next data center