Tip of the Hat: Unanswered questions in Boeing Black specs
Reporters offer some simple answers to complex questions raised by the release of specs for the Boeing's long-awaited secure smartphone
Computerworld - This week's posting of specifications for the secure Boeing Black smartphone brought out references to the old Mission Impossible television show and other fictional spy heroes.
The reports downplayed the apparent delay in developing the secure phone -- Boeing was expected to unveil it more than a year ago. They instead concentrated on its operating system (Android), its size (5.2-in. tall, 170 grams in weight and a 4.3-in. display) and most of all its self-destruct mode -- where all data is erased if the device is tampered with.
While the data released this week does offer some new information about the Boeing device and its capabilities, it also raises more questions about it and the growing market for secure phones. Such as: Is it another blow to struggling BlackBerry, the maker of President Barack Obama's secure phone? Can Android truly be secured?
A Computerworld Tip of the Hat to Will Connors and Jon Ostrower of the Wall Street Journal for their concise, easy-to-read blog post, 5 Questions About The Boeing Black, which provides answers to those and other questions about the device and the state of the secure phone business.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts