Feeds
70%

Motorola ROKR E8 music phone

Can it revive the fortunes of the ROKR family

5 things you didn’t know about cloud backup

Review Motorola’s ROKR music mobiles hasn’t exactly set the world on fire, the let-down of its E1 setting the par for the rest. With the E8 however, Motorola has approached the music mobile arena afresh.

This model introduces some new design thinking to the range, not least Motorola’s own take on the current vogue for context-changing controls and an iPod-like navigation dial.

Motorola MOTOROKR E8

Motorola's ROKR E8: introducing the ModeShift

Music is the headline act for the E8. Its music credentials include a multi-format music player with 2GB of internal storage and a slot for MicroSD cards of up to 4GB capacity. A standard 3.5mm headphone socket is included too.

There’s no 3G capability in this handset, however, so over-the-air tune downloads rely on slower speed Edge and GPRS connectivity. Wi-Fi is a no-show too.

The E8’s function-swapping ModeShift controls are likely to be a major eye-catcher. Unlike some recent phones that utilise context-sensitive touchpads, such as the Samsung Soul and LG KF600, the E8’s whole front panel changes look and function as you switch between phone, camera and music player.

The essential guide to IT transformation

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.