Feeds

Motorola prepping four-strong phone launch?

Handset designs leaked online

Choosing a cloud hosting partner with confidence

Motorola has been pretty quiet of late, but the discovery of pictures of four potential new models could mean the manufacturer’s looking to kick-start 2009 with a bang.

motoflash

Motorola's Flash looks, well, flash

The most exciting looking of the four phone pictures – uncovered by website BGR – is a touchscreen talker said to be called 'Flash'.

It has angled edges and four physical buttons across the bottom of its touchscreen, which may be for placing and ending calls, accessing the main menu and stepping back up the menu chain.

motocalgary

Calgary - Flash with a keypad?

The second talker – thought to be codenamed 'Calgary' - is pretty similar looking, but has a slide-out keypad underneath the display and is shown with an electric blue backlight running around the keys.

Much like the iPhone, Calgary only has a home button on its surface. But the picture indicates that the touchscreen would used for accessing Messaging, Dialpad, Main Menu and Contacts apps.

motorush2

Rush 2 looks basic, but could surprise with 3G and a decent shooter

'Rush 2' is the third Motorola handset design that’s been leaked. Like Calgary, Rush 2 also has a slide-out keypad underneath its display.

This phone probably won’t be targeted at top-end users because of its relatively small screen and iPod-style scroll wheel, which suggests the display isn’t touch-sensitive.

motoinferno

Inferno is a back to basics design, with a semi-transparent flip

Motorola clearly hasn’t forgotten lovers of its traditional phone design though, with the fourth leaked phone – 'Inferno' – sporting a flip design akin to many existing Moto models, such as the Rokr EM28.

Although several shots of Inferno have been leaked, relatively little can be deduced from them. The top half of the phone looks to be semi-transparent and we can just about make out a camera lens on the back of the phone.

Launch dates or prices for any of the four Motorola handsets haven’t been uncovered yet.

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.