Category: Wireless


For all my clients coming from Chilliwack  and Hope – there is now an incentive to come to our shop!  Not only will we beat ANY and ALL price quotes from all Chilliwack iPhone repair shops.  We guarantee our parts are real OEM and not knockoff like we have been seeing a lot of from out that way.  Ask about our free gift with purchase! (Mention this Blog Post)

One customer named Bob came in earlier today and mentioned he has been to another iPhone repair place in Chilliwack on Unsworth.  His screen lasted two days after the replacement was put in, upon further inspection, we informed Bob the part was a fake knockoff and very low quality.. The screen wasn’t even set properly and was practically coming off the LCD.  UV glue was not properly used.

At Ryan’s PC Repair Shop, we provide our customers with real original OEM parts (You get what you pay for), a 6 month warranty on the parts and labour and after sale service you can always depend on.  Ryan’s been in the industry for over 10 years and fix just about any issue you may have.

If you’ve been to another shop and they’ve told you the phones not repairable, bring it by my shop and I’ll get it working for you.  There is no charge to look at the device if its not repairable! No diagnostic fees charged ever!

600 million Apple devices contain secret backdoors, researcher claims

Apple-iconA security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.

Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.

Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.

According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.

Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”

“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.

A man shows a photograph he took on his iPhone of an Apple store in Beijing

According to the researcher, evidence of the mysterious programs raises more questions than it does answers.

“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”

“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”

Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”

“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”

“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.

On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”

 

Source: RT

Android and Windows smartphones to get ‘kill switch’

Google and Microsoft have both revealed that they will integrate a ‘kill switch’ into the next versions of their smartphone operating systems, allowing customers to disable their devices if they are lost or stolen.

Google told Bloomberg that it will add a “factory reset protection solution” to its next version of Android

Meanwhile, Microsoft’s vice president for US government affairs, Fred Humphries, said that the company would be adding new anti-theft capabilities to its Find My Phone feature in Windows Phone before July 2015.

“With these additional features, we’re hopeful that technology – as part of a broader strategy – can help to further reduce incentives for criminals to steal smartphones in the first place,” Humphries said in a blog post.

The news comes after Apple introduced ‘activation lock’ and ‘delete phone’ to its Find My iPhone app in September 2013.

As a result, robberies involving the company’s products reportedly decreased by 19 per cent in New York in the first five months of this year. San Francisco and London have also seen Apple-related robberies drop.

New York attorney general Eric Schneiderman said the statistics illustrate the “stunning effectiveness of kill switches”, and has called for other smartphone companies to add theft-deterrence features to their devices.

US Senator Amy Klobuchar, a Minnesota Democrat, and Jose Serrano, a New York Democrat, have both introduced bills that would require phones sold in the US to include kill-switch technology.

Last summer, the Mayor of London Boris Johnson also wrote to eight companies – including Apple, Samsung and Google – stating that about 10,000 handsets are stolen every month in London, and manufacturers have a “corporate responsibility” to help tackle thefts.

“If we are to deter theft and help prevent crimes that victimise your customers and the residents and visitors to our city, we need meaningful engagement from business and a clear demonstration that your company is serious about your corporate responsibility to help solve this problem,” Mr Johnson told manufacturers.

“Each of your companies promote the security of your devices, their software and information they hold, but we expect the same effort to go into hardware security so that we can make a stolen handset inoperable and so eliminate the illicit second-hand market in these products.

“We hope you would support this objective. Customers and shareholders surely deserve to know that business cannot and must not benefit directly from smartphone theft through sales of replacement devices.”

Source: The Telegraph

Samsung Group ousted from Apple’s A8 chip manufacturing

It seems Apple isn’t satisfied with the production of A-series processor based on the 20-nm process by Samsung Group.

The Cupertino could say goodbye to the Galaxy maker for it. If it happens, the doors will be opened for other partners like TSMC. Apparently, the South Korean group isn’t sufficiently fulfilling 20-nm chips demand, which will be used by Apple in the next iPhone and iPad this year.

No doubt Apple wants to get rid of Samsung deliberately. The duo has been in courtrooms for several years and counting. Although, Samsung has produced A-series processor for Apple, but it’s not a coincidence that the Cupertino based tech giant has formed a strategic partnership with TSMC.

As 2014 has just begun, according to some reports, the Taiwanese company TSMC could start supplying those A8 chipsets. It was reported earlier that TSMC will fulfill about 70% of all demands while the remaining quotient will be covered by Samsung. But that’s something, which has changed.

It appears that the yield of the preliminary testing of A8 chip by Samsung is very low compared to what Apple requires – to have some physiological advantage over rivals – 20-nm process based chipset for future iPhones and iPads.

In the meantime, TSMC may have shown more performance, then the Cupertino would have decided to invest solely on the world’s largest dedicated independent semiconductor foundry, helping the expansion of Apple products on the planet for years.

In addition, TSMC has already demonstrated that they are ready to switch from 20 to 14 nanometers, the size likely to be adopted by the A9 for iPhone 7, probably. The final farewell to Samsung could be accomplished by the middle of 2014 instead of between 2015 and 2016 as previously assumed.

Besides these ergonomics, the A8 chip would be incorporating LTE directly, according to rumors from the East and will be managed by a dedicated processor manufactured by Qualcomm. Apple seems likely to make the iPhone and the iPad compatible with all LTE frequencies on the planet, including even those that will be managed only in the future.

Source: Inferse

Android for all and the new Nexus 5

android repair abbotsford - android screen repairs abbotsford Just in time for Halloween, we have two new treats for Android fans. First, we’re excited to unwrap our latest platform release, KitKat, which delivers a smarter, more immersive Android experience to even more people. And second, we’re introducing Nexus 5—a new Nexus phone developed with LG.

The first thing you’ll notice about KitKat is we’ve made the experience much more engaging: the book you’re reading, the game you’re playing, or the movie you’re watching—now all of these take center stage with the new immersive mode, which automatically hides everything except what you really want to see.

 

Bringing more Google smarts to Android
Behind the polish on the screen is the power under the hood. Take the Phone app, which for most people hasn’t really changed since the days of flip phones. Now, we’re making calling easier than ever, by helping you search across your contacts, nearby places, or even Google Apps accounts (like your company’s directory), directly from within the app. And with the new Hangouts app, all of your SMS and MMS messages are together in the same place, alongside your other conversations and video calls, so you’ll never miss a message no matter how your friends send it. This is just a small taste of KitKat—learn more on our site.

Google has always focused on helping users get immediate access to the information they need, and we want to bring this same convenience and power to users on Android. With the new Nexus 5 launcher, Google smarts are deeply integrated into the phone you carry around with you, so getting to the information you need is simple, easy and fast. Swipe once from the home screen to get Google Now literally at your fingertips. Put Google to work for you by saying “OK, Google” to launch voice search, send a text, get directions or even play a song you want to hear. And in the coming weeks, we’re enhancing Now with important new card types that bring you information about contextual topics that interest you such as updates from a favorite website or blog.

Reaching the next 1 billion users
Building a platform that makes mobile phones accessible for everyone has always been at the heart of Android. Until now, some lower-end Android phones couldn’t benefit from more recent Android releases due to memory constraints. With KitKat, we’ve slimmed down Android’s memory footprint by doing things like removing unnecessary background services and reducing the memory consumption of features that you use all the time. We did this not only within Android but across Google services like Chrome and YouTube. RAM (or memory) is one of the most expensive parts of a phone, and now Android can run comfortably on the 512MB of RAM devices that are popular in much of the world, bringing the latest goodies in Android 4.4 within reach for the next billion smartphone users.

Introducing Nexus 5
Along with our sweet naming tradition, we also introduce a new device with each platform release to showcase the latest Android innovations. For KitKat, we partnered with LG to develop Nexus 5 — the slimmest and fastest Nexus phone ever made. Its design is simple and refined to showcase the 5” Full HD display. Nexus 5 also keeps you connected at blazing speeds with 4G/LTE and ultra fast wifi. The advanced new lens on Nexus 5 captures more light for brighter night and sharper action shots. And with optical image stabilization, you no longer have to worry about shaky hands and blurry pictures. A new HDR+ mode automatically snaps a rapid burst of photos and combines them to give you the best possible single shot. Learn more on our site.

 

 

Nexus 5 is available today, unlocked and without a contract, on Google Play in the U.S., Canada, U.K., Australia, France, Germany, Spain, Italy, Japan and Korea (and coming soon to India), starting at $349. Just in the time for the holidays, Nexus 5 will be available soon at the following retailers: Sprint, T-Mobile, Amazon, Best Buy and RadioShack.

Android 4.4, KitKat, which comes on Nexus 5, will also soon be available on Nexus 4, 7, 10, the Samsung Galaxy S4 and HTC One Google Play edition devices in the coming weeks.

Source: Google’s Official Blog

Researchers describe hacking iOS devices with malicious charger

Researchers from the Georgia Institute of Technology will be demonstrating a proof-of-concept method of hacking an iPhone using a malicious USB charger. Billy Lau, Yeongjin Jang, Chengyu Song announced the demonstration for Black Hat USA 2013, an annual conference for hackers and security researchers that begins on July 27th in Las Vegas.

The short version is the three researchers found a way to use USB protocols to bypass some of Apple’s security features in iOS that prevent unauthorized software from being installed on your iOS device. The three built a charger based on a BeagleBoard (see below)—a US$125 computer-on-a-circuit-board—that was able to successfully insert malware onto an iPhone plugged into it.

Worse, they can do so in under a minute.

“Despite the plethora of defense mechanisms in iOS, we successfully injected arbitrary software into current-generation Apple devices running the latest operating system (OS) software,” the researchers wrote on their BlackHat presentation description. “All users are affected, as our approach requires neither a jailbroken device nor user interaction.”

In the demonstration, they said will discuss Apple’s existing security mechanisms that protect against “arbitrary software installation,” which in layman’s terms essentially means malware. They will then describe how standard USB capabilities can be, “leveraged to bypass these defense mechanisms.” To finish it off, they will demonstrate how this same process can be used to then hide the resulting malware from the user the same way Apple hides its own built in software.

The three researchers named their malicious charger “Mactans.”

The BeagleBoard it is based on is an off-the-shelf circuit board that can be used to create all manner of tiny computing devices running Angstrom (Open Embedded), Debian, Ubuntu, and Gentoo. There are other BeagleBoard products as well, including a slightly larger model with a 1GHz Sitara ARM Cortex-A8 processors that can run Android.

The point the researchers are making is that their method can be accomplished with readily available technology.

“While Mactans was built with limited amount of time and a small budget,” they wrote, “we also briefly consider what more motivated, well-funded adversaries could accomplish.”

The researchers will offer methods for protecting yourself against such an attack—we’ll throw out that you should probably be choosy about using a charger whose provenance you can’t verify—and what Apple can do to make this attack, “substantially more difficult to pull off.”

Source: UPI

Canada’s new wireless rules are great, but let’s not kid ourselves

The CRTC, determined to reform Canada’s usurious wireless phone cartel, has just issued a strict new “Code of Conduct.”

Effective this December, three-year phone contracts will be available, but unenforceable. If you’re stuck in one of these abusive long-term relationships, you’ll be able to sever it at the two-year mark without penalty.

You know those bill-shocker stories about customers getting hit with thousands of dollars in data overage fees after letting their kids watch YouTube on their iPhones while vacationing in Cuba? Roaming data overage will now be limited to $100 a month, domestic to $50.

You’ll be able to have your subsidized phone unlocked after 90 days, you’ll have a right to a simpler contract and you’ll be able to negotiate changes to that contract.

Hooray, right?

Yes and no. The CRTC’s new pro-consumer stance is, without question, a good thing. But our big three carriers (Bell, Rogers and Telus) still control 95 per cent of the mobile market. Canadians are not going to start using less mobile anytime soon, regardless of the terms we’re offered. In fact, a wireless industry lobby group just sponsored a major study which (they claim) proves that Canadians are actually willing to pay more than we already do for our smart phones. Industry lobbiests are already using the report to suggest that Canadian consumers are getting a bargain. I say charging $50 for an umbrella during a thunderstorm isn’t a good deal just because people would still buy them at $60.

The point is, if the big three can’t maintain their globally-envied RPUs (revenue per user) under the old rules, they’ll find other ways to keep profits up while colouring within the lines of the new ones.

What will that mean? You can expect monthly fees to climb, and new “bonus” add-ons to be fabricated  marketed. We already see carriers offering 4G speed-upgrades — for a fee. I predict that any new speed capacity will be chopped into separate products at separate price points, in a move akin to offering regular, premium and super-premium gasoline. That’s off the top of my head. If there are other ways to sneak new costs into our bills, wireless companies will find them.

The missing ingredient in Canadian wireless is not a tough regulator, but tough competition, backed by unrestrained foreign investment. However, even if Ottawa steps in to untangle the red tape and make this possible, our international reputation may be too tarnished. After the recent experiences of Mobilicity and Wind, who felt “left to the dogs” by Canada’s government once they were wooed in, the Canadian market may be a no-go zone for international mobile firms.

All around the world, smart phones are getting cheaper, wireless speeds are getting faster and people are doing more and more new things with their mobile devices. It’s happening here too. Just less so.

Ryan:  Having worked for the big 3 (Rogers, TELUS & Bell) I can speak on behalf of most Canadians by stating that this is a positive step in the right direction.  Now they just need to adjust the price fixing problems / incorrect roaming bills.  Why not just shut off service to phones when a certain point is reached? Why are we as Canadians still paying for Call Display / Voicemail?  

Source: Maclean’s

Lock Screen Security Bug Found: Samsung Galaxy S3

Following closely on the heels of a Samsung Galaxy Note 2 security vulnerability, another Samsung user has found that the bug affects other models.

Unlike the Samsung Galaxy Note 2 flaw, the bug allows for full access to the Samsung Galaxy S3. The method is similar in that it requires a fleet-fingered user to hop through a number of screens.

As discovered by Sean McMillian, the smartphone can be manipulated by tapping through the emergency call, emergency contacts, home screen, and then the power button twice. McMillian admits that the bug isn’t consistent — sometimes, he said, it works right away, while other times it takes 20 attempts.

Indeed, we weren’t able to replicate the bug after many tries (Engadget was able to do it, but it took a long time). That suggests that would-be snoopers must act quickly and deftly, but the lesson here (and always) is to keep a watchful eye on that $500 smartphone.

As McMillian indicates, the bug seems to be related to Samsung’s software and not an Android-wide issue. Judging by the similarities in the two flaws, we might expect Samsung to issue software updates to address the concerns.

Source: CNET

Blacklist created to fight smartphone theft

Canada’s wireless carriers are targeting smartphone theft by setting up a database that will blacklist lost or stolen phones to prevent them from being reactivated.

The move would also help protect personal data on such devices, the Canadian Wireless Telecommunications Association said Thursday.

Smartphones are worth $600 to $700 and can be resold on the black market, noted association president Bernard Lord.

“With this database, it makes that a lot less attractive because the buyer of the stolen phone will not be able to connect to any network in Canada,” Lord said from Ottawa.

“It eliminates the incentive for stealing a device.”

The idea is also to reduce the black market value of a smartphone in the eyes of criminals, Lord added.

Once consumers call their wireless carrier to report their smartphone lost or stolen, the device’s internal identification number goes on the electronic blacklist.

Lord said even though more smartphones are lost than stolen, law enforcement officials have raised concerns about the issue.

The database for the Canadian wireless industry will be up and running by September 2013 and Canada’s carriers will also be contributing to an international database to help prevent smartphone theft, he said.

However, consumers who have their smartphones lost or stolen are “not off the hook” for paying their smartphone contracts.

A website will also be set up by the association to help consumers protect their smartphone data and help protect themselves from theft.

Lord said the smartphone’s ID number — called the international mobile electronic number — will be verified by carriers to make sure the device has not been lost or stolen.

The Canadian Radio-television and Telecommunications Commission congratulated the wireless industry for the initiative, but would like the database running sooner rather than later.

“I would strongly encourage the industry to implement the database before September 2013 to ensure Canadians benefit from this added protection as soon as possible,” chairman Jean-Pierre Blais said in a statement.

The creation of a database and collaboration to make sure stolen or lost devices aren’t reactivated will help make them less desirable to thieves, Blais said.

“The CRTC has been concerned for some time about reports of an increase in crimes involving lost or stolen cellphones.”

Telus said while the wireless industry, law enforcement, and regulators all have a role to play, smartphone users need to think about where they’re buying their devices.

“We ask consumers to reconsider buying phones on sites like eBay, Craigslist, or Kijiji and instead buy their devices from a verified dealer,” Telus spokesman Shawn Hall said.

“If you buy a phone from Craig’s List it might be legitimate, but it could be stolen and then you will likely be unable to get it activated,” he said.

Smartphone use in Canada is among the highest in the world and penetration has exceeded 50 per cent, Lord said.

Canada’s wireless industry will spend about $20 million on the initiative, he said.

The United States is also taking steps and will have a similar database to fight the black market for smartphones in November 2013, Lord said.

Ryan says:  This should change the market in the way deals are made on classified for sale sites.  Phones will be checked first to see if they work properly before buying.  New tricks will be implemented ie. IMEI / IMSI masking so I do not see this as a long term solution for blacklisting phones but its a move in the right direction.

Source:  CTV News

iOS 6.0.1 already jailbroken — for some devices

iOS 6.0.1 users can now jailbreak their devices, but there are some bumps in the road.

The latest version of the iPhone Dev Team’s Redsn0w can jailbreak iOS 6.0.1 devices, Redmond Pie confirmed today after testing the update.

However, not everyone can take advantage of the effort at this point.

The jailbreak works only on iOS devices powered by an A4 chip or lower. People who own the iPhone 5, the newest iPads, or the latest iPod Touch are out of luck. The jailbreak takes advantage of the Limera1n exploit, which can’t handle the A5 or later chips.

That leaves just the iPhone 3GS, iPhone 4, and the iPod Touch 4G as prime candidates. The iPod Touch 3G and the original iPad don’t support iOS 6.0 or higher.

The jailbreak is also a tethered one. So after you shut down or reboot your device, you’ll need to connect it to your computer to return it to a jailbroken state.

Apple, or course, isn’t too fond of jailbreaking, a process that allows device owners to unlock certain features and install apps not found in the App Store.

The iPhone maker once tried to argue that the action violates its copyright. The U.S. Copyright Office recently ruled that jailbreaking is illegal on tablets and gaming consoles but not on smartphones.

Source: CNET

Five reasons people will want a BlackBerry 10 Phone

The BlackBerry 10 Dev Alpha, handed out to developers in May, provided little information about what the finished product would look like. But a better picture has since emerged.

Will BlackBerry 10 phones, which are expected to arrive early next year, be worth the wait? For months, that question had no good answer.

While Apple’s wildly successful ads calmly wrap themselves around a single have-to-have feature (see SIRI) we haven’t yet had the benefit of a full rundown on BlackBerry 10 specs. So we have been left with what we are normally left with in the space before any anticipated consumer device arrives: speculation, rumour, and the odd grainy photo. It’s right around this time in the launch cycle that an iPhone is “accidentally” found in a Palo Alto tavern and pictures show up on various gadget sites, sending fanboys into a predictable lather.

So far, there has been no Canadian equivalent. To date, not one has misplaced a BlackBerry 10 device at a Tim Hortons in Moose Jaw, or a canteen in a Kitchener rink. But a picture has begun to emerge. New RIM CEO Thorsten Heins has been equal parts helpful and feckless, revealing key details of BlackBerry 10 to select media, then reverting to more vague, big picture proclamations that have sometimes provoked ridicule, such as when he said that with BB10 “We’re here to win, we’re not here to fight for third or fourth place,” after the company had fallen to less than 5% of total smartphone sales in Q2.

If RIM is to regain some, if not all, of its lost market share, BlackBerry 10 devices will need to be great, not just good. The good news for RIM supporters is that early indications suggest devices loaded with the new operating system will give RIM every chance. We break down five reasons people will want a Blackberry 10 device.

1. Its contact manager will be great

Early last year, RIM acquired Seattle-based Gist, a company that focused on integrating social media elements into contact management. The startup was founded in 2008 by T.A. McCann, who formerly worked in Microsoft’s Exchange Server Group. Gist actually received its initial funding from Microsoft co-founder Paul Allen’s Vulcan Capital.

Now McCann’s team is taking on a key role at RIM.

“BlackBerry has always had this heritage of productivity. We are just going to make it better yet again, when we launch BB10,” McCann told Reuters recently. He says that in addition to the BlackBerry contacts app, Gist has been tasked with the responsibility of everything social at RIM including BlackBerry Messenger (BBM), the Facebook and Twitter apps, instant messaging as well as much of the identity platform, BlackBerry ID.

A Gist user review hints at the possibilities:

“The main idea behind Gist is pretty similar to other social media aggregators like MyBlogLog, FriendFeed, Seesmic and Google Buzz” says Gist user Dustin Luther. “However, there’s one HUGE improvement they’ve made. Rather than forcing you to view updates based on a timeline (i.e. most recent updates first), they allow you to view updates in a “people” mode where you can view all the updates from that person (whether they are on Facebook, Twitter, their blog, foursquare, etc.) based on the importance that you’ve selected. (Facebook has tried to do this with their “top news” feature, but it’s crude at best and doesn’t do a great job finding updates that are important to me)”.

2. It will have a cool camera

When new RIM CEO Thorsten Heins offered a sneak peak at some of the features of its new BlackBerry 10 operating system, the things that got the biggest oohs and aahs from the crowd at BlackBerry World were the new camera features. A tidy demo that followed showed the new camera will allow the user to “go back in time” using a circular timeline slider to pick the perfect moment. While the phone looks to be a marked improvement over what is on the market today, it is unlikely that it will present a distinct business advantage, as the technology behind it is licensed from a Swedish company called Scalado that was acquired by Nokia in June.

3. It will have better battery life

The new BB10 devices will feature an OLED (Organic Light-Emitting Diode) screen that, unlike its LED counterparts, doesn’t require a backlight. While some budget devices, such as the Toshiba T-02D and the Samsung Exhilarate, have employed OLED, RIM has the opportunity to bring it to the mainstream. Other details reveal that RIM is extremely battery focused with BB10. The new BBM, for instance, will feature a darker screen that will save battery life by as much as 25%. And for real road warriors, Thorsten Heins told the Wall Street Journal recently that BlackBerry 10 phones will include a removable battery, so heavy users can swap a fresh one in, rather than traipse around an airport for a power source.

4. It will be fast

RIM acquired QNX, which became BlackBerry 10 after a legal spat, in April 2010. The Ottawa-based company was founded in 1980 and acquired by Harman International in 2004. QNX developed an operating system called the QNX Neutrino, which is more familiar to those familiar with OS’s used in mission critical environments, such as high speed trains in Europe and Japan, nuclear power plants, even the Canadarm. Neutrino employs a micro-kernal structure in which each application runs in its own memory space on this operating system, allowing the device to multi-task like nothing that is currently on the market.

5. Lack of apps won’t be an issue

One could argue that many apps built for the iPhone were necessary because the device’s browser did not support Adobe Flash. But that’s a story for another day, especially now that that fence has been mended in the post Steve Jobs world. A persistent critique of BlackBerrys has been BlackBerry App World, which is dwarfed by Apple App Store. But Alec Saunders RIM’s VP of developer relations, says the image that BlackBerry is bleeding app developers is simply false. BlackBerry App World, he points out has grown its vendor base by 157% in the past year, and just passed the three billion download mark. The QNX Neutrino operating system, which provides support for Adobe Flash and Air, Java, HTML 5.0 and C++. makes it inherently developer friendly, insists Saunders.

“I have been receiving a lot of feedback from developers personally and I can tell you that I am hearing again and again that developers are amazed by how easy it is to work with the BlackBerry 10 tools, ” he said recently, adding: “They appreciate the open nature of our platform, which allows developers to bring their work and their skills and find a toolset that will work for them.”

Among BlackBerry App World’s more than 90,000 apps, you’ll now find all the regular battery monitoring and texting ones, plus brands such as Pandora, Angry Birds, Youtube, Twitter, and Facebook.

Source: Cantech Letter