SlideShare a Scribd company logo
1 of 2
Download to read offline
Defense, Space & Security
Security, modularity
and productivity
delivered in one
trusted mobile device
Boeing Black
Smartphone
The Boeing Company
7700 Boston Blvd.
Springfield, VA 22153
www.boeing.com/black
black@boeing.com
Copyright © 2014 Boeing. All rights reserved.
Android is a trademark of Google Inc.
259625
The Challenge
The U.S. defense and security communities demand
trusted access to data to accomplish their missions.
Despite the continuous innovation in commercial mobile
technology, current devices are not designed from
inception with the security and flexibility needed to match
their evolving mission and enterprise environment.
Our Solution
The Boeing Black smartphone was designed with
security and modularity in mind to ensure our customers
can use the same smartphone across a range of
missions and configurations.
SECURITY + MODULARITY = PRODUCTIVITY
Through embedded hardware security features, software
policy configurations and physical modularity, Boeing
Black gives customers a trusted, more flexible and
productive solution.
SECURITY
Boeing Black’s security is powered by the Boeing
PureSecure architecture, which was designed from the
outset for the mobile environment. Our architectural
foundation is built upon layers of trust from embedded
hardware, operating system policy controls, and
compatibility with leading mobile device management
systems. The device’s hardware roots of trust and
trusted boot ensure the device starts in a trusted
state, enabling maximum security of data. Hardware
media encryption and configurable inhibit controls are
embedded to protect the device, its data, and the
transmission of information, significantly reducing the risk
of mission compromise due to data loss.
MODULARITY
Boeing Black provides unparalleled modularity and
integration with other mobile ecosystems based on
mission-specific requirements. Boeing Black’s flexibility
is enabled by a modular expansion port. The expansion
port can be used for integrating additional sensors or
technology enhancements like satellite connectivity or
expanding power capacity, plus other customizations.
The device also includes connections for portable digital
media interface (PDMI), universal serial bus (USB) and
secure digital (SD) cards.
PRODUCTIVITY
Boeing leveraged more than 100 years of combined
IT innovation experience from across the company to
deliver a trusted and highly productive mobile solution
for both the user and device administrator. Boeing
Black has a dual-SIM capability that enables users to
switch between government and commercial networks.
Boeing Black integrates seamlessly into customer
mobile device management systems and virtual private
networks. Running an operating system for AndroidTM
with enhanced software security policy configuration,
customers can configure the device for maximum mission
productivity and security.
Security, modularity and productivity delivered in one trusted mobile device
Boeing Black Smartphone
131.9 mm
67.6 mm13.25 mm
Product Specifications
•	Display: 4.3” qHD (540 x 960 pixels)
•	Weight: 170g
•	Battery: Lithium-Ion 1590 mAh
•	Dual SIM Supported Bands:
-	 LTE 700/1700/2100
-	 WCDMA 850/1900/2100
-	 GSM 850/900/1800/1900
•	Bluetooth v2.1 + EDR-enabled connectivity
•	Dual 1.2 GHz ARM Cortex-A9 CPUs
•	Storage: On-board + microSD
•	Expansion Ports: micro USB, PDMI, Modular 24-Pin Connector
•	Security Features: Embedded FIPS 140-2 Key Storage, Hardware Inhibits,
Trusted Modules, and Configurable OS Security Policies

More Related Content

What's hot

Nokia microsoft alliance
Nokia microsoft allianceNokia microsoft alliance
Nokia microsoft allianceGurudutt Reddy
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter MovesLaurent Viviez
 
Mobile application developments
Mobile application developmentsMobile application developments
Mobile application developmentsFusion Informatics
 
F2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobileF2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobileSven Kirsimäe
 
GlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux FoundationGlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux FoundationGlobalLogic, Inc.
 

What's hot (7)

Smartphone and their market
Smartphone and their marketSmartphone and their market
Smartphone and their market
 
Nokia microsoft alliance
Nokia microsoft allianceNokia microsoft alliance
Nokia microsoft alliance
 
Smarter Phones Smarter Moves
Smarter Phones Smarter MovesSmarter Phones Smarter Moves
Smarter Phones Smarter Moves
 
Android viswapriya viswa 1
Android viswapriya viswa 1Android viswapriya viswa 1
Android viswapriya viswa 1
 
Mobile application developments
Mobile application developmentsMobile application developments
Mobile application developments
 
F2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobileF2F Mobile Computing / The Frid goes mobile
F2F Mobile Computing / The Frid goes mobile
 
GlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux FoundationGlobalLogic Joins the Linux Foundation
GlobalLogic Joins the Linux Foundation
 

Similar to Boeing black smartphone_product_card

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalCleophas Kipruto
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationRon Favali
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy PhonesJohn Adam
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)Andris Soroka
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
BlackBerry PRIV Brochure
BlackBerry PRIV BrochureBlackBerry PRIV Brochure
BlackBerry PRIV BrochureBlackBerry
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld
 
Breaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesBreaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesUnified Communications Online
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochureSherief Razzaque
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric AuthenticationSamsung SDS America
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile IntelligenceRichard Blech
 

Similar to Boeing black smartphone_product_card (20)

Ibm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 finalIbm fiberlink analyst presentation nov 13 final
Ibm fiberlink analyst presentation nov 13 final
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
World's Most Secure Privacy Phones
World's Most Secure Privacy PhonesWorld's Most Secure Privacy Phones
World's Most Secure Privacy Phones
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
IBM Mobile First
IBM Mobile FirstIBM Mobile First
IBM Mobile First
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
Breaking down physical boundaries
Breaking down physical boundariesBreaking down physical boundaries
Breaking down physical boundaries
 
Bio Star 09 Biometric Authentication
Bio Star 09 Biometric AuthenticationBio Star 09 Biometric Authentication
Bio Star 09 Biometric Authentication
 
BlackBerry PRIV Brochure
BlackBerry PRIV BrochureBlackBerry PRIV Brochure
BlackBerry PRIV Brochure
 
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...VMworld 2013: Android in the enterprise: Understand the challenges and how to...
VMworld 2013: Android in the enterprise: Understand the challenges and how to...
 
Breaking down the physical boundaries between businesses
Breaking down the physical boundaries between businessesBreaking down the physical boundaries between businesses
Breaking down the physical boundaries between businesses
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
Samsung and Android Security brochure
Samsung and Android Security brochureSamsung and Android Security brochure
Samsung and Android Security brochure
 
Nexsign Biometric Authentication
Nexsign Biometric AuthenticationNexsign Biometric Authentication
Nexsign Biometric Authentication
 
Proximity Mobile Intelligence
Proximity Mobile IntelligenceProximity Mobile Intelligence
Proximity Mobile Intelligence
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Boeing black smartphone_product_card

  • 1. Defense, Space & Security Security, modularity and productivity delivered in one trusted mobile device Boeing Black Smartphone
  • 2. The Boeing Company 7700 Boston Blvd. Springfield, VA 22153 www.boeing.com/black black@boeing.com Copyright © 2014 Boeing. All rights reserved. Android is a trademark of Google Inc. 259625 The Challenge The U.S. defense and security communities demand trusted access to data to accomplish their missions. Despite the continuous innovation in commercial mobile technology, current devices are not designed from inception with the security and flexibility needed to match their evolving mission and enterprise environment. Our Solution The Boeing Black smartphone was designed with security and modularity in mind to ensure our customers can use the same smartphone across a range of missions and configurations. SECURITY + MODULARITY = PRODUCTIVITY Through embedded hardware security features, software policy configurations and physical modularity, Boeing Black gives customers a trusted, more flexible and productive solution. SECURITY Boeing Black’s security is powered by the Boeing PureSecure architecture, which was designed from the outset for the mobile environment. Our architectural foundation is built upon layers of trust from embedded hardware, operating system policy controls, and compatibility with leading mobile device management systems. The device’s hardware roots of trust and trusted boot ensure the device starts in a trusted state, enabling maximum security of data. Hardware media encryption and configurable inhibit controls are embedded to protect the device, its data, and the transmission of information, significantly reducing the risk of mission compromise due to data loss. MODULARITY Boeing Black provides unparalleled modularity and integration with other mobile ecosystems based on mission-specific requirements. Boeing Black’s flexibility is enabled by a modular expansion port. The expansion port can be used for integrating additional sensors or technology enhancements like satellite connectivity or expanding power capacity, plus other customizations. The device also includes connections for portable digital media interface (PDMI), universal serial bus (USB) and secure digital (SD) cards. PRODUCTIVITY Boeing leveraged more than 100 years of combined IT innovation experience from across the company to deliver a trusted and highly productive mobile solution for both the user and device administrator. Boeing Black has a dual-SIM capability that enables users to switch between government and commercial networks. Boeing Black integrates seamlessly into customer mobile device management systems and virtual private networks. Running an operating system for AndroidTM with enhanced software security policy configuration, customers can configure the device for maximum mission productivity and security. Security, modularity and productivity delivered in one trusted mobile device Boeing Black Smartphone 131.9 mm 67.6 mm13.25 mm Product Specifications • Display: 4.3” qHD (540 x 960 pixels) • Weight: 170g • Battery: Lithium-Ion 1590 mAh • Dual SIM Supported Bands: - LTE 700/1700/2100 - WCDMA 850/1900/2100 - GSM 850/900/1800/1900 • Bluetooth v2.1 + EDR-enabled connectivity • Dual 1.2 GHz ARM Cortex-A9 CPUs • Storage: On-board + microSD • Expansion Ports: micro USB, PDMI, Modular 24-Pin Connector • Security Features: Embedded FIPS 140-2 Key Storage, Hardware Inhibits, Trusted Modules, and Configurable OS Security Policies