Feeds

LG to take on iPhone with 'super 3G' tablet

Prada lookalike

Choosing a cloud hosting partner with confidence

With so many handsets already available, it’s inevitable that some will look a little similar. But, LG’s new KS20 handset looks like the recently separated twin of the manker's existing Prada handset.

LG_KS20
LG's KS20: 3.6Mb/s HSDPA and a 2.8in touchscreen

Cunningly released just a few days before the iPhone goes on sale in the UK, the KS20 has a 2.8in touchscreen allowing users to view web pages downloaded over 3.6Mb/s HSPDA 3G connections. The tri-band GSM handset also includes 802.11b/g Wi-Fi connectivity, with Bluetooth 2.0 for short-range communication.

The phone ships with a 128MB internal memory and accepts Micro SD cards for storing pictures taken on its two-megapixel camera. However, it also acts as a multimedia device and stores video and music files, including MPEG 4 and MP3 formats, respectively. An FM radio’s included too.

Running on the Windows Mobile 6 OS, the handset gives around four hours of talk time and a good 400 hours in standby, LG claimed.

LG said the phone is available in “major” European countries today, so the UK should be in for a delivery. A price hasn’t been confirmed, though.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.