Samsung Galaxy Tab 3 range of Android tablets to be launched in India tomorrow

July 19, 2013

Samsung_Galaxy_Tab_3

Jul 19: announced its new Galaxy Tab 3 range in London and now it seems the company is ready to bring these tablets to our shores. Earlier this morning, the South Korean company tweeted a teaser image of the tablet ahead of the launch event at Delhi tomorrow. Though it announced the 7, 8 and 10.1-inch variants in the Galaxy Tab 3 range, the Samsung India e-store listings show that we might only be getting the 7 and 8-inch tablets for now. That said, there are chances that the 10.1-inch Intel-powered tablet could be heading our way some time later.

Talking of the specifications, the Galaxy Tab 3 7.0 sports a 7-inch WSVGA (1024×600 pixels) display and is powered by a dual-core Marvell processor clocked at 1.2GHz and paired with 1GB of RAM.

Other features included are 3-megapixel rear camera, 1.3-megapixel front camera, 8GB of expandable internal storage, 4,000mAh battery and it will run on Android 4.1 Jelly Bean.

The Galaxy Tab 3 8.0, on the other hand, flaunts an 8-inch WXGA TFT (1280×800 pixels) display, which is similar to the one on the Galaxy Note 8.0 but without the stylus functionality.

The tablet includes features like 1.5GHz dual-core Exynos 4412 processor, Mali 400 GPU, 1.5GB of RAM, 5-megapixel rear camera, 1.3-megapixel camera on the front, 4,450mAh battery and 16GB of internal memory that can be expanded using a microSD card. Connectivity-wise, the tablet features Wi-Fi, Bluetooth 4.0, USB and A-GPS and on the software front, the device runs on Android 4.2 Jelly Bean.

Earlier reports have suggested that Samsung is likely to price the 7-inch tablet somewhere around Rs 12,000 and the 8-inch tab at around Rs 18,000 in India. We should have more information tomorrow when we report live from the Samsung event. So stay tuned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 27,2020

Mumbai, Jun 27: The Bombay High Court observed that COVID-19 patients from poor and indigent sections cannot be expected to produce documentary proof to avail subsidised or free treatment while getting admitted to hospitals.

The court on Friday was hearing a plea filed by seven residents of a slum rehabilitation building in Bandra, who had been charged ₹ 12.5 lakh by K J Somaiya Hospital for COVID-19 treatment between April 11 and April 28.

The bench of Justices Ramesh Dhanuka and Madhav Jamdar directed the hospital to deposit ₹10 lakh in the court.

The petitioners had borrowed money and managed to pay ₹10 lakh out of ₹12.5 lakh that the hospital had demanded, after threatening to halt their discharge if they failed to clear the bill, counsel Vivek Shukla informed the court.

According to the plea, the petitioners were also overcharged for PPE kits and unused services.

On June 13, the court had directed the state charity commissioner to probe if the hospital had reserved 20% beds for poor and indigent patients and provided free or subsidised treatment to them.

Last week, the joint charity commissioner had informed the court that although the hospital had reserved such beds, it had treated only three poor or indigent persons since the lockdown.

It was unfathomable that the hospital that claimed to have reserved 90 beds for poor and indigent patients had treated only three such persons during the pandemic, advocate Shukla said.

He further argued that COVID-19 patients, who are in distress, cannot be expected to produce income certificate and such documents as proof.

However, senior advocate Janak Dwarkadas, who represented the hospital, said the petitioners did not belong to economically weak or indigent categories and had not produced documents to prove the same.

A person who is suffering from a disease like COVID-19 cannot be expected to produce certificates from a tehsildar or social welfare officer before seeking admission in the hospital, the bench noted and asked the hospital to deposit ₹10 lakh in court within two weeks.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 22,2020

New Delhi, Jan 22: "Don't get into a trap. Your security is in your hands," the Border Security Force (BSF) has said issuing its social media rules for its officers and men. It has directed them not to use 42 mobile applications and show caution while using Facebook, Twitter and WhatsApp.

"Be cautious while using social media," said the BSF in a circular issued recently.

"Before using WhatsApp, Facebook, Twitter and other social media platforms, one needs to keep in mind that you are border guarding force and Central Civil Services (Conduct) Rules rule duly are applicable," it said.

It further pointed out that by commenting/writing about or forwarding unverified reports and rumours one violates laws of land.

"Several times unverified reports would be presented in way that they are absolutely true and start believing it. Seeing such post always use your commonsense and never get into the trap (sic.)," it state adding that the anti-national elements uses social media to propagate their agenda to cause unrest in India.

A picture clicked by Border Security Force personnel and posted on a social media platform remains there for always. Therefore, one should use officially approved pictures about any incident or untoward incidents related to Border Security Force, stated the circular. It pointed that unauthorised persons should not engage into taking pictures of the incidents.

It also highlighted how through social media, a few BSF personnel have fallen into trap of espionage racket carried out by enemy countries.

"Our security and respect is in our hands. Always think twice whether you are doing correct by accepting friendship requests from unknown persons, especially women and girls," it cautioned the troopers and officers.

It also highlighted that while going on leave and joining back the force, always follow the rules and regulations laid out for safety and security. "This is for your own safety," it stressed in the end.

The BSF has also issued a list of 42 mobile applications that needs to be completely avoided by serving BSF officers and jawans.

They are MI store, Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautyplus, NewsDog, Viva Video - QU video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - HI Security Lab, CM browser, MI Community, DU recorder, Vault Hide - No mobile Security, Youcam Makeup, Cachecleaner DU Apps Studio, DU battery saver, DU privacy, 360 security, DU Browser,Clean master - Cheeta Mobile, Baidu Translate, Wonder Camera - Bindu Inc, ES Ifle Explorer, Photo Wonder, QQ international , QQ music, QQ Mail, AA player, QQ News Feed, Wesync, QQ security Center, Selfie City, Mail Master, Mi Video Call -Xaomi and QQ launcher.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.