Feeds

Retro-style phone mixes VoIP, Dect

The Power of One Brief: Top reasons to choose HP BladeSystem

Manufacturer Thomson has designed a stylish wireless home phone supporting VoIP and Dect. However, the Symbio has enough additional features to leave you wondering how everything fits into its skeleton-like look.

Symbio_thomson

Thomson's Symbio: VoIP, Dect and SMS in one

The Symbio uses a stylised traditional phone design, but enables both landline and internet calls. The internet connection also means web radio stations can be played through the phone’s two 3W speakers, or into a pair of headphones. MP3 files can be set as ringtones.

A 128 x 128 display is built into the handset’s underside. The screen displays basic call information, such as caller ID and conversation length, and can present RSS newsfeeds too. It also shows information about the music being played over the internet, such as station idents and artists' names.

If your mobile phone’s gone walkabouts, then be thankful that the Symbio sends SMS messages too. It might be a wise idea to put your mobile phone’s contact library into the Thomson phone first though, seeing as the home phone has enough storage capacity for 200 people.

An alarm function means you can chuck out your bedside bleeper too, using the phone to wake you up to Internet radio instead. The whole unit measures 210 x 45 x 55mm.

A release date or price for Thomson’s Symbio hasn’t been phoned in yet.

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.