Feeds

Motorola posts slimline slider phone specs

Z revealed

Remote control for virtualized desktops

Motorola's Z ultra-slim slider phone will sport a 2.2in, 262,000-color 240 x 320 display, incorporate up to 128MB of memory, be capable of operating as an e-book reader and be able to play 128-voice polyphonic ringtones, the company's South Korean subsidiary, which designed the phone and launched it earlier this week, said today.

As we noted yesterday, at 14.8mm thick, the Z isn't the thinnest phone around, but it's pretty slim for a slider phone. It's 104mm long and 51mm wide, and weighs 110g. It has a 1.3-megapixel camera on the back and a 720mAh battery inside - capable, Motorola claimed, of delivering 130 minutes' talk time and running for 160 hours on stand-by.

There's even the scary sounding "D-day function", which is more likely a feature inserted by our translation software than a button which launches the invasion and liberation of France.

In addition to the e-book reader software, the Z has an English-Korean dictionary on board and the obligatory MP3 player. ®

motorola z slider phone

motorola z slider phone

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.