Fujitsu marks significant strides in mobile computing solution business
>Fujitsu Computer Systems is shipping in volume its second-generation convertible Tablet PC, the LifeBook T4000, the company announced recently.
Fujitsu Computer Systems is shipping in volume its second-generation convertible Tablet PC, the LifeBook T4000, the company announced recently. The computer is intended as a solution for field-force automation. The company also announced enhancements to its Stylistic ST5020 unit. New features on that model include a faster processor, up to 9 hours of battery life, wide viewing angle and dedicated graphic chipset for sharper imaging, and better sound capabilities.
The company announced the rollout of a large-scale LifeBook T4000 integration by Shaw Industries, which purchased more than 1,100 of the Tablet PCs. The device gives the user the option of either using either a keyboard or pen for data input and management at a twist of the screen. Integration of a modular bay offers flexibility to choose a multi-format DVD writer, second battery, or weight-saver option to meet specific needs. Display features up to a 180° viewing angle to make it suitable for a wide variety of lighting environments.
Units are designed for mobile workers who must rely on their system throughout the entire workday. The system can deliver up to 8.5 hours of battery life with both batteries installed. Advanced security measures are designed to deter unauthorized use and enable secure authentication.
New version of the Stylistic ST5000 model comes with a choice of integrated wireless connectivity and optional Bluetooth technology. Designed to protect data with a number of security features, the device has a built-in biometric fingerprint swipe sensor that eliminates need for managing multiple passwords to access the network, email accounts, or other protected systems. It also includes a dedicated SmartCard slot that can be used to verify identification or make secure online transactions. Its Trusted Platform Module (TPM), an embedded security system, protects sensitive data from unauthorized users and enables secure authentication.
—Jeanine Katzel, senior editor, Control Engineering, firstname.lastname@example.org