Feeds

Sony counters iPod Shuffle with the Bean

Is it a runner?

Sony has launched a curvy, palm-sized portable music player dubbed, not inappropriately, the Bean.

Sony Walkman BeanWe'll resist the opportunity to suggest the Japanese giant's move is somewhat half-baked. Instead, we'll point out that the design is certainly more Mister Bean than Sean Bean.

More formally monikered the NW-E205, the 512MB Flash-based Network Walkman Bean supports Sony's own ATRAC3 Plus format and MP3. It's available in four colours: blue (aka 'Tropical Ice'), pink (Cotton Candy), black (Licorice) and white (Coconut), all selected to suggest jellybean styling rather than a more haricot heritage. The unit has a one-line OLED screen.

The Bean has its own, integrated USB connector for both song transfer and battery charging. The built-in Lithium Ion cell yields 50 hours' playback time, Sony said, though that presumably assumes you're playing 48kbps ATRAC3 files. The battery requires only three minutes' charging to provide three hours' playback, though a full charge will take rather longer.

In addition to the 512MB NW-E205, Sony is offering the 1GB NW-E207, with the same choice of colours.

Both models are due to ship mid-September. The NW-205 will retail for £79, the NW-E207 for £99. ®

Sony Walkman Bean

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.