Nokia and others launching “iphone-like” gear by Q2 2008?

This is what the cellphone industry needs, competitive! And you can thank Apple for this. More phones produced, with more functionality, and for a lower cost. This is what we need!

This is what the cellphone industry needs, competitive! And you can thank Apple for this. More phones produced, with more functionality, and for a lower cost. This is what we need!

Nokia and others launching "iphone-like" gear by Q2 2008? Taiwan’s OEM reporting pulse — DigiTimes — claims that handset makers Asustek, BenQ, Compal and Arima Communications are all "aggressively developing iPhone-like products" for 2008. According to their sources, the devices will run on Microsoft’s Windows Mobile platform and target business markets with features such as 3G and GPS. DigiTimes‘ sources also claim that Nokia will release its Symbian-based "iPhone-like handset" in the first half of 2008. True or not, that’s a lot of Apple hate-bait to swallow this early in the morning.

0 Shares:
You May Also Like

Featured Windows Download: Manage Multiple Remote Desktop Connections with mRemote

LifeHacker has a review up on their site about a little application called 'mRemote'. This is quite a piece of software and you can tell that the developers have spent some time on it. I have always been an advocate of being more organized and efficient. With mRemote everything that you need is in one screen, and everything that was left out with Microsoft's Remote Desktop Connection Client is in mRemote. Tabbed windows, supports RDP, VNC, SSH2 and telnet protocols. There is also a connection manager, so you can setup all your connections and then point and click to connect.

Network Solutions (NSI) is registering every domain name checked throug their WHOIS

I always thought there was something really strange about the WHOIS searches done at Registrars. Specifically the searches would have to be done on their website, a normal "whois" lookup through Linux wouldn't show up registered the next day.
A story is developing regarding domain name registrar Network Solutions front running domains. According to multiple sources on DomainState.com, it appears that domains searched via NSI are being purchased by the registrar thereby preventing a registrant from purchasing it at any other registrar other than NSI. As an example, a random domain which DNN searches such as HowDoesThisDomainTasteTaste.com can be seen in this whois search to now be unavailable to register at other registrars but at NSI it can be purchased
Full article at domainnamenews.com

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]