Feeds

Motorola launches first Linux smartphone

First to two 'secret weapons', too

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Motorola yesterday launched its first Linux-based smartphone into the Far Eastern market.

Announced last February, the A760 uses Linux as a core operating system, on top of which Java provides a multimedia application framework. Software that ships with the device includes a PDA-style personal information management suite, a video player, music player, an instant messaging tool and more.

The A760 uses a flip-top design, looking not unlike a Handspring Treo, but minus the micro keyboard. In place of the keypad is a circular navigation button. The handset features an integrated digicam, and Bluetooth, Infra-Red and USB connectivity.

The handset made its Asia Pacific debut at the Taipei International Telecomms and Networking Show, one of nine new phones launched in the region yesterday. Among them was the first of the company's "secret weapons", the V690.

At the Taiwanese launch of the E365 handset a couple of weeks ago, local Motorola chief Tom Hsiao told reporters that the company had "two secret weapons" in the pipeline.

The V690 appears to be the same handset built by Taiwan's Chi Mei Communication Systems (CMCS), codenamed 'Beethoven'. The clamshell-cased handset opens to reveal a 128x160 LCD on one half of the phone, and a navigation wheel and function button cluster above a numeric keypad on the other. The phone's antenna is built-in and hidden from view.

CMCS recently registered a similar handset with the US Federal Communications Commission (FCC), believed to be codenamed 'Chopin'. ®

Intelligent flash storage arrays

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.