News
11/9/2010
09:24 AM
50%
50%

Windows Phone 7 A Hot Seller

T-Mobile temporarily lists device based on Microsoft's new mobile OS as sold out.

Take that Apple! Smartphones based on Microsoft's new Windows Phone 7 operating system are in such demand they're selling out—fast.

Microsoft's Windows 7 Revealed
(click image for larger view)
Microsoft's Windows 7 Phone Revealed

T-Mobile's entry in the Windows Phone 7 race—the HTC HD7—was temporarily sold out Monday.

However the phone, which features a high-definition display and 16 GB of built-in memory—appeared to be back in stock as of early Tuesday.

The demand is a good sign for Microsoft, which needs Windows Phone 7 to be a hit if it's to get back in the smartphone race against Apple and Google.

Gartner predicts the release of Windows Phone 7 will help bump Microsoft's share of the worldwide mobile OS market from 4.7% in 2010 to 5.2% in 2011, but says the company's share will ultimately fall back to just 3.9% by 2014 as competitors Apple and Google continue to gain steam with the iPhone and Android, respectively.

AT&T Wireless is Microsoft's primary launch partner for Windows Phone 7. The carrier is now offering the Samsung Focus and HTC Surround, both for $199 with a two-year contract.

The devices also require a minimum data plan priced at $15 per month in addition to standard minutes charges. AT&T also is offering no-contract versions of the phones for $499. It subsequently plans to introduce a third Windows Phone 7 smartphone, the LG Quantum.

T-Mobile, the other U.S. carrier for Windows Phone 7, is selling the HTC HD7 for $199 with a two-year contract and minimum, $15 data plan. T-Mobile also will launch the Dell Venue Pro at a later date.

T-Mobile's backlog notwithstanding, consumers' best bet for getting their hands on a Windows Phone 7 device quickly appears to be the carriers themselves. Best Buy is only advertising the HTC Surround as "coming soon," while Amazon is already hawking the LG Quantum, but notes the phone is on a back order of eight to nine days.

Windows Phone 7 devices, regardless of manufacturer, will deliver a common user experience based on an interface Microsoft calls Live Tiles. The tiles, six in total, allow users to quickly access calling, social media, messaging, photo, e-mail, and personal applications and services. They also deliver real-time information to the main interface.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.