Header Ads

Ericsson F3607gw: HSPA module of the new generation

The company introduced the brand new Ericsson mobile broadband modules, Ericsson F3607gw, designed for networks HSPA / GPRS / EDGE. This device appears on the market in June. This module, with the words producer, will have the advanced functionality and ease of use characterized by: thanks to innovative features, low power consumption, over a long period of battery life and high level of integration reduces the number of components and as a result - the cost of solutions. The new module will also provide support for mobile broadband access to the Microsoft Windows 7.

An important feature F3607gw is a unique feature that allows you to include remote device via a wireless connection. When a laptop or netbuk is in sleep mode, the module keeps the connection to the Internet and allows the user to translate the device in operating a remote way. Thanks to this innovative technology can create new computer applications that provide enhanced security and working in resident mode. These include, for example, include the ability to block access to a computer in the event of theft and receiving instant messages, and critical security updates.

Operators can also combine the function of the remote will turn on the built-GPS, to create a number of differentiated services for private and corporate clients, such as remote control, installation of security updates, resource protection and monitoring of «boundaries», in which the device should be. In addition, the module can be used to provide services to the automatic delivery of content such as podcasts, public alerts, traffic updates, and databases.

In particular, the function of the remote device supports the inclusion of security solutions based on technologies to protect portable devices from theft of Intel (Anti-Theft PC Protection Technology). The network service sends an SMS-message module mobile broadband access to the secure connection to transfer its work to the Intel Anti-Theft for the processor platform, which, in turn, performs the necessary action, such as completely blocking the device. Once the laptop is found, recovering unlock the message, resulting in access to the data being restored.

No comments:

Powered by Blogger.