DeviceAnywhere lets devs play with 500 phones over the net

DeviceAnywhere is a company that wires cellphone hardware into servers, which are then accessible over the internet. Mainly used by software developers and for cross platform development, instead of buying all the phones you can just rent them and use them over the internet. Talk about the ultimate iPhone hack. Mobile Complete, a software-services company, has pulled an iPhone to pieces and lashed it to a remote-controlled server. Every input and output on the dissected iPhone is electrically hooked up to the net, providing access to would-be iPhone programmers over the web.

DeviceAnywhere is a company that wires cellphone hardware into servers, which are then accessible over the internet. Mainly used by software developers and for cross platform development, instead of buying all the phones you can just rent them and use them over the internet.

Talk about the ultimate iPhone hack. Mobile Complete, a software-services company, has pulled an iPhone to pieces and lashed it to a remote-controlled server. Every input and output on the dissected iPhone is electrically hooked up to the net, providing access to would-be iPhone programmers over the web.

“It’s all occurring electrically on the handset,” says Faraz Syed, CEO of Mobile Complete. “They are surprisingly reliable and robust, even though they look like we’ve cut them open and killed them.”

The service, called DeviceAnywhere, offers about a thousand disassembled cell phones of every description running 24/7 for real-time remote testing. It’s a boon to developers who must test their work cross-platform and cross-carrier, but are unwilling to spend a small fortune on handsets and contracts.

Read the full article at wired.com


Did you like this article?


0 Shares:
You May Also Like

Firefox Extensions Waiting to Be Exploited

With anything that is open source, bugs and exploits will be found. However, this makes it easy for developers to patch these issues. As they know the code that is causing the problem, and usually the hacker will provide a patch for them that just needs to be reviewed. However, this is a real concern for myself, since I use over 10 FireFox extension.
Firefox Extensions Waiting to Be Exploited - Do you think you are safe with Firefox? In general, I would agree with you. But at the same time, I would also point out that there is a fairly sizable security concern that may be addressed, as effectively as some security experts might like. It's called the Firefox extension. [WArp2Search]
Read More

Comcast traffic blocking: even more apps, groupware clients affected

More information about the supposed filters that Comcast has implemented to curb Bittorrent traffic on its network. Only now it looks as though the appplication suit Lotus Notes is affected.
Last week, we reported on mounting evidence that Comcast is targeting and disrupting BitTorrent traffic on its network. Further digging by interested parties has turned up more indication that BitTorrent isn't the only popular P2P protocol being tampered with by the United States' largest ISP.
Read More