Feeds

Orange preps latest own-brand smart phones

SPV M500 and SPV M2500 in the pipeline

  • alert
  • submit to reddit

Build a business case: developing custom apps

Orange looks set to become the latest mobile phone network to rebrand HTC's 'Magician' compact PocketPC-based phone, according to its Dutch website.

Orange SPV M500The network is also preparing to release the keyboardless version of HTC's 'Blue Angel' PocketPC phone, which Orange already offers as the SPV M2000, other sites suggest.

It's not clear when the Magician-based handset, dubbed by Orange the SPV M500, is expected to ship, or whether it will be made available in other countries. Magician is already available from a number of phone vendors, such as i-Mate, which sells it under the Jam brand.

It's clear from the specifications that the M500 is based on Magician, though the case design doesn't exactly match HTC's standard casing. The tri-band Windows Mobile 2003-based handset contains 64MB of RAM and a 1.3 megapixel camera, the Orange Netherlands site says. It's got Bluetooth and supports MMS, the site adds.

Meanwhile, Orange is also gearing up to offer the SPV M2500, a handset based on HTC's 'Alpine' design, better known as the O2 XDA IIi, according to MoDaCo. The M2500 lacks the M2000's slide-down QWERTY keyboard, but features a higher specification: more memory - 128MB of Flash to the M2000's 96MB - a faster processor - 520MHz Intel PXA272 to the older models' 400MHz PXA263 - and a better camera - now at 1.3 megapixel from the old 300,000-pixel job. Both models sport a 3.5in 240 x 320 LCD and tri-band GSM/GPRS radio.

The site also claims that i-mate is preparing a version of Alpine, to be called the PDA2. ®

Related stories

Group Sense preps Euro smart phone
T-Mobile unveils Sidekick-styled 3G device
O2 3G handsets go on sale
O2 falls for Blackberry 'Charm'
O2 unveils compact PocketPC phone

Related reviews

HTC 'Magician' PocketPC phone
HTC 'Blue Angel' Wi-Fi PocketPC phone
Mio 8390 smart phone

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
PwC says US biz lagging in Internet of Things
Grass is greener in Asia, say the sensors
Ofcom sees RISE OF THE MACHINE-to-machine cell comms
Study spots 9% growth in IoT m2m mobile data connections
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.