Home android
 

Keywords :   


Tag: android

Altair, Macom, D2 Technologies and Alpha Networks Present Pioneering Android LTE Smart Home ...

2014-02-27 06:00:00| Industrial Newsroom - All News for Today

New Gateway Offers LTE Broadband with VoLTE, Remote Control and Appliance Monitoring for Smart Home IoT Functionality<br /> <br /> BARCELONA, Spain, Mobile World Congress -<br /> <br /> Altair Semiconductor (<a href="http://www.altair-semi.com">http://www.altair-semi.com</a>), the world's leading developer of high-performance, single-mode LTE chipsets, today announced that it has partnered with M/A-COM Technology Solutions Holdings, Inc. (NASDAQ: MTSI) (MACOM) and D2 Technologies to power the ...This story is related to the following:Gateways

Tags: home present networks technologies

 

Hands On With the $33 Android Smartphone

2014-02-26 18:34:11| PC Magazine Cell Phones Product Guide

We had a chance to get a hands on demo with the $33 K-Touch T619 Android smartphone.

Tags: hands smartphone android

 
 

BlackBerry: Run Your Android Apps Here!

2014-02-26 18:34:11| PC Magazine Cell Phones Product Guide

BlackBerry isn't giving up on BlackBerry 10, but it may let Android app stores shoulder some of the third-party app burden.

Tags: run apps blackberry android

 

When Will Microsoft Dump Windows Phone for Android?

2014-02-26 18:34:11| PC Magazine Software Product Guide

Nokia—in the process of being acquired by Microsoft—is now releasing Android phones. Finally, Microsoft can stop panicking itself into competition with Google where none was ever necessary.

Tags: phone windows microsoft microsoft windows

 

Android malware seen using TOR anonymity network

2014-02-26 13:54:58| InfoWorld: Top News

Kaspersky Lab has spotted malware for the Android mobile operating system employing the TOR anonymity network, a development previously only seen on Windows. TOR, short for The Onion Router, is software that offers users a greater degree of privacy when browsing the Internet by routing encrypted traffic between a user and a website through a network of worldwide servers. TOR can also be used to host websites on a hidden network.

Tags: network tor malware anonymity

 

Sites : [336] [337] [338] [339] [340] [341] [342] [343] [344] [345] [346] [347] [348] [349] [350] [351] [352] [353] [354] [355] next »