Feeds

Sony sells pink kit to benefit Breast Cancer research

  • alert
  • submit to reddit

High performance access to file storage

Pink products may be a downer for many women, but Sony has at least a good reason for releasing a selection of salmon-hued hardware: it's all in aid of Breast Cancer Awareness Month over in the States.

Sony Breast Cancer Vaio
Sony's Vaio CR: buy one, Sony give $75 to Breast Cancer Research

Buy a pink Vaio CR notebook, a rose-tinted NWZ-A816 Walkman media player or a coral DVP-FX810 portable DVD player, and Sony will donate $75, $10 and $10, respectively, to the cause, up to a grand total of $50,000.

Sony Breast Cancer Vaio
Sony's Vaio CR: good-cause computing

For the boys, here's the specifications bit: the CR has a 2.2GHz Intel Core 2 Duo T7500 processor, backed by 2GB of 667MHz DDR 2, a 200GB hard drive and a CD/DVD burner. The graphics chip's built into the Intel 965GM chipset and it drives a 14in, 1280 x 800 glossy display.

Sony wants $1370 for it, but only $150 for the 4GB Walkman. It features a 2in, 240 x 320 display, and can play a range of music and video formats - including MP3 and WMA - for up to 33 hours and eight hours, respectively.

Sony Breast Cancer Walkman
Sony's Walkman: listen to this and you'll do some good...

The $190 DVP-FX810 has an 8in display on which to view DVDs when you're out and about.

Sony Breast Cancer DVD player
...as you will if you watch DVDs on this

But what does it matter what's inside the box, it's what it does that counts. Ditto, Sony's - albeit conditional: you don't buy, we don't donate - willingness to cough up to help pay for research into a cure for Breast Cancer, and to fund educational programmes and care in the meantime.

The Walkman and the DVD player will go on sale on 4 October, with the Vaio following four days later on 8 October. You can buy any or all of these rosy items through Sony's US Sony Style chain, or the company's US website.

the hardware widow
*The Hardware Widow is hitched to a young, hardware geek - the
Tech Obsessed Youth - who thinks he knows more about technology than she does...

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.