Feeds

T-Mobile calls up cut-price Sidekick iD

And Hiptop 3 arrives down under

Security for virtualized datacentres

T-Mobile has started selling a cut-down version of its Sidekick 3 consumer-friendly email phone that strips outs the camera, Bluetooth and a GSM frequency to knock a hundred bucks off the price.

T-Mobile Sidekick iD

Dubbed the Sidekick iD, the pitch is that this is not only the cheapest Sidekick yet but the most customisable: the coloured corner, back and screen-frame panels can be replaced. Cool for the kids, huh?

The iD is slightly smaller than the 3 and weighs a little less too, but there's no digicam or Bluetooth connectivity on board, and it's dual-band (850/1900MHz) phone, whereas the 3 is a more worldwide roaming-friendly tri-band device.

T-Mobile Sidekick iD
T-Mobile Sidekick iD

One other benefit: the iD has double the 3's stand-by battery lift, six hours to the old model's three. At five hours, the iD's talk time is slightly higher than the 3's four-and-a-half. But there's no memory card in the box.

Only available in the US, the T-Mobile is charging $300 for the iD, though with instant online discounts and mail-in rebate coupons, the phone can be had for $100. With similar deals, the 3 costs $200.

T-Mobile Sidekick iD
T-Mobile Sidekick iD

The Sidekick family is T-Mobile's name for Danger's Hiptop range. Danger also said that Australians, who have been languishing in the Hiptop 2 era for some time will now get to upgrade to the Hiptop 3, thanks to indigenous telco Telstra.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.