Feeds

T-Mobile launches Motorola KRZR in the UK

And the Samsung E870 in champagne

Security for virtualized datacentres

T-Mobile is the first network in the UK to announce the new Motorloa KRZR - or the K1 as it's also known. Just 4.2cm wide, this slimmed down version of the RAZR offers superior features such as a two megapixel camera and Bluetooth wireless stereo.

motorola_krzr_open

At a mere 10.3 x 42 x 1.6cm, the KRZR is a dinky phone, but it's still quite heavy: 102g. A Micro SD card slot is available for memory expansion, as the KRZR has a mere 20MB of memory. The music player supports MP3, AAC, and AAC+ formats and you can also watch MPEG4 and 3GPP video.

The display offers a resolution of 176 x 220 pixels, which is fairly low by today's standards. The radio supports EDGE networks and operates on quad-band GSM 850/900/1800/1900MHz networks.

T-Mobile also announced a champagne coloured version of the Samsung E870, a colour that's exclusive to T-Mobile. The Samsung E870 is a clamshell phone with a 1.3 megapixel camera, 80MB of built in memory, and offers similar functionality to other Samsung handsets currently available.

samsung_e870_champagne

The KRZR will be available from free to £300 on pay-as-you-go while the E870 will cost anything from free to £200 on pay-as-you-go. Both phones are available now from T-Mobile. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.