Feeds

Ericsson smartens smartphone

R380 gets um, new colour and USB

  • alert
  • submit to reddit

High performance access to file storage

Updated Ericsson has revamped its R380e smartphone.

It's a dual band Symbian phone, but not an open device, which means you can't load third-party software. And there's no Java.

But Ericsson claims it's faster, has a better battery and it now sports a USB port and comes in a colour.

It emphatically doesn't feature a colour screen, we learn, and as we reported earlier. This was probably wishful thinking on our part, so apologies for the goof.

The omission of a USB slot on the Nokia 9210 is one of its greatest bugbears: you need to download your Doom Wad files over a serial link. It has the same memory is the same as the existing R380 models. The R380e will only work in Europe, and Ericsson wouldn't say if a US-capable version, an upgrade to the current R380 World, will be made available.

We wrote about the upgrade a few weeks ago: then, Ericsson swore like crazy that it the R380 wasn't going to be superseded by a faster, colour model R580. Sources close to Ericsson told us we were spot on, and we now suspect this revamped R380 is a placeholder for a faster model.

It's expected to be available for £99 which is pretty good value, although it will reinforce suspicions that a premium-priced model (with a gen-u-wine colour screen) is a possibility.

When the R380 was launched networks offered it with contract for around £299, but the price rapidly fell. Shortly after its introduction, Palm saturated the market (and caused catastrophic disruption to its high margin business model) with low-cost Palms, which in turn, devalued the worth put on PIM functionality.

Clearly, there's a lot of room for experimentation for pricing smartphones, and the vendors are feeling their way as they go.

Ericsson held the launch today with in front of "the yachting media" in Southampton we're told. Undeterred, we'll persevere in getting a review to you. Even if it means we have to start writing about boats. ®

Related Stories

Ericsson denies existence of second Symbian phone

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.