Leaked photos of HTC phone surface
- 12 February, 2013 16:08
Photos of an unreleased HTC Android phone have been leaked on Twitter account @evleaks.
The device is rumoured to be called the HTC One and was formerly codenamed M7.
The leaked press image shows a large smartphone with a strange button layout. The phone pictured has a back button on the left and a home button on the right, flanked by a rather large HTC logo.
The image doesn't appear to show multitasking button, which has long been a traditional feature of HTC Android phones.
The phone appears to have a two-tone colour scheme, with a black bezel surrounding the screen and a white piece on both the top and bottom edges.
Both pieces could house a speaker — the company published an infographic last week suggesting it will "kick off a new sound and camera experience in 2013."
The HTC One is expected to feature a 4.7in full HD display and is likely to come with the latest version of the company's Sense user interface, version 5.0.
HTC will hold a press event in New York on Tuesday 19 February where it is expected to unveil the HTC One. The event is scheduled a few days before the Mobile World Congress (MWC) 2013 event in Barcelona, Spain.
MWC is the world's largest mobile trade show and traditionally sees most major mobile manufacturers release new smartphones.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Advanced Persistent Threats and Real-Time Threat Management
Businesses face a constantly evolving threat landscape. One of the greatest challenges is presented by advanced persistent threats (APTs), which are sophisticated, multi‐faceted attacks targeting a particular organisation. Mitigating the risk of APTs requires advances beyond traditional layered security to include real‐time threat management. This whitepaper describes the nature of APTs, the risks they pose to businesses, and techniques for blocking, detecting, and containing APTs and other emerging threats. Read now.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.