Vulnerabilities / Threats // Insider Threats
12/27/2010
07:49 PM
50%
50%

Dell 'Looking Glass' Tab Specs Revealed

The 7' Android tablet will support 3G and Wi-Fi wireless networks according to documents the computer maker filed with the FCC.

Dell Streak Tablet
(click image for larger view)
Dell Streak Tablet

Some details of Dell's second tablet computer have found their way to tech sites via public documents filed with the Federal Communications Commission. The documents, dated Dec. 17 and made available Monday, provide some specs on a seven-inch tablet with the marketing name "Looking Glass."

The device supports 802.11n Wi-Fi and 3G network technology used by AT&T and T-Mobile. The documents cover tests done on the device's wireless technologies, which also include Bluetooth v2.1. Other details, such as the processor and other components are not covered.

Dell gave its first peek of the upcoming tablet to attendees at the Oracle OpenWorld conference in San Francisco in September. Chief Executive Michael Dell showed off a prototype of the seven-inch tablet during his keynote, but offered no other details.

The computer maker introduced its first tablet, called the Streak, to the United States in August, after first launching the Android-based device in Europe. The tablet has a five-inch screen and can make voice calls, as well as browse the Web. The Streak sells for $299 with a two-year AT&T service contract. Without a contract, the tablet costs $549.

With the Looking Glass, Dell is apparently going head-to-head with the Apple iPad. The Streak's small screen made it less of a competitor, despite some nifty features, such as a 5-megapixel camera with dual-LED flash. Qualcomm's 1GHz SnapDragon processor powers the device. Dell is offering the Streak with integrated healthcare software, an indication that the device is headed toward more business-type applications.

Dell is only one of several computer makers lining up with tablets to challenge the iPad. Other vendors jumping into the market include Hewlett-Packard, Asus, Samsung, and others. Many of these vendors, including Dell, are expected to introduce their iPad challengers next month at the Consumer Electronics Show in Las Vegas, Nev.

SEE ALSO:

Dell To Launch Second Tablet

Dell Unveils Its First Tablet PC

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.