Samsung’s 3G SGH-T639 being sold by T-Mobile

Touted as the first 3G enabled phone for T-Mobiles network. Samsung's 3G SGH-T639 being sold by T-Mobile – This summer, we all got our hopes up when Samsung’s (apparently 3G-enabled) SGH-T639 found its way into the FCC, and now that the handset is reportedly on sale in New York City, it’d be a great time to work yourself into a tizzy once more.

Touted as the first 3G enabled phone for T-Mobiles network.

Samsung's 3G SGH-T639 being sold by T-Mobile – This summer, we all got our hopes up when Samsung’s (apparently 3G-enabled) SGH-T639 found its way into the FCC, and now that the handset is reportedly on sale in New York City, it’d be a great time to work yourself into a tizzy once more. According to PhoneScoop, the 3G-capable T369 is indeed “the first phone to be compatible with T-Mobile’s 3G network, even though the network is not yet up and running.” Oddly enough, Samsung managed to conceal this dirty little secret just yesterday, but now that the truth is out there, all that’s left to do is hope that this release means that T-Mobile’s 3G launch is coming sooner rather than later. [EnGadget]


Did you like this article?


0 Shares:
You May Also Like

Microsoft adds Virtual Machine additions for Linux

Microsoft has released an Update to its Virtual Server 2005 R2 SP1. This update improves on the interoperability of running "Qualified" Linux Operating Systems as guests or Virtual Machines. With added support for SuSE Enterprise Server 10, Guest and Host time synchronization, SCSI hard disk emulation and more! The Qualified Linux Operating Systems don't include Debian, Ubuntu or any Unix/BSD OS. :(
Read More

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]
Read More

JVC designs tiny 4k D-ILA chip

JVC designs tiny 4k D-ILA chip -

Filed under: ,

JVC 1.27-inch 4K2K D-ILA chipJVC announced at InfoComm 2007 a 1.27-inch 4K2K D-ILA chip for use in projectors that offer up more than four times high-definition resolution. Intended initially for medical, modeling, and simulation use, the chip can produce a ten-megapixel 4096x2400 pixel image with a 20,000:1 contrast ratio. While DLP-based 4K projectors are currently in use in some digital cinemas, the JVC chip will be used in D-ILA, a variant of LCoS (Liquid Crystal on Silicon), and has a higher pixel density. Much like professional racing technologies trickle down to the average sedan on the street, the research that goes into 4K projectors can also make their way to HDTVs in the home, bringing smaller, higher-definition sets to a living room near you. We say bring on the quad-split-screen HD!

 

Read | Permalink | Email this | Comments


Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!

[EnGadget]
Read More

Brewery offers lifetime supply of beer in return for stolen laptop

A brewery in New Zealand is offering a lifetime supply of beer, in return for a laptop that was stolen from the Croucher Brewing Company in Rotorua New Zealand. Typically if something is stolen, the theft will usually use it or sell it. Everyone has been approached with an offer to buy a new laptop for cheap, and you know in the back of your head that its stolen. But in this case would you be seen as the bad guy for buying the stolen laptop, or the good guy for returning it for the free lifetime supply of beer?
Read More