dcsimg

WP7 Device Models Leaked to Websites

WEBINAR:
On-Demand

Application Security Testing: An Integral Part of DevOps


Microsoft and Manufacturers are all tight lipped regarding the upcoming Windows Phone 7 devices but details on the devices still managed to leak to the web. All the phones seem to bear common characteristics, which isn't surprising since Microsoft has been strict with specifications.

Picures, video and other details about LG's keyboard-enabled c900, the touchscreen-only e900, HTC's Mozart, and Samsung's i917. HTC, LG, and Samsung HTC are all expected launch partners so we can expect devices from all of these manufacturers.

Photos,videos and details of upcoming Windows Phone 7 devices leaked to the Web.

View Article



Comments

  • There are no comments yet. Be the first to comment!

  • You must have javascript enabled in order to post comments.

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Discover the best practices from HPE’s IT Advisory Consulting Services for migrating and transforming applications in Hybrid IT by capitalizing on innovative platforms, modern application architectures, agile development tools and proven methodologies. There are a number of challenges our customers face when migrating and transforming applications for a Hybrid IT environment. This guide provide proven strategies and application approaches that can help them understand and reduce risks and complexity.

  • As enterprises flock to the cloud, many IT leaders struggle to design an effective migration strategy. Between a decentralized infrastructure and pressure to innovate, many enterprises are struggling with performance issues, soaring management costs, and drifting without a plan to manage their business in a cloud environment.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date
×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.