Feeds
60%
BT Granite

BT Granite slimline DECT cordless phone

Making a cordless more like a mobile

  • alert
  • submit to reddit

SANS - Survey on application security programs

Review BT's new DECT handset, the Granite, introduced us to a genuinely new experience. Opening the box, it wasn't the phone that took pride of place under the lid, but its stand. The Granite itself was tucked away under a fold of card right at the back. Unbox the product too hastily and you might miss it.

BT Granite

BT's Granite: slimline

The DECT phone has always been the Ugly Sister to the cellphone's Cinders, lacking the grace, elegance and - more to the point - functionality of their less stay-at-home siblings. BT clearly hopes the Granite will change that, and while the handset isn't bad looking for a DECT phone - and is a lot slimmer than most - it feels depressingly cheap.

Out of the box, it weighs next to nothing, and inserting the slim lozenge of a lithium-polymer battery makes no appreciable difference. Now, not weighing a ton is generally a good thing, but here it only serves to reinforce the flimsy, plasticky feel of the handset.

That sensation is reinforced by the chrome-coloured sides and metal-hued back, the latter with a glossy veneer that does the exact opposite of what we think its designers intended. The (equally glossy) black front looks better, and at least the handset's dimensions have a candybar cellphone comfortable-in-your-hand size.

But back to the battery. BT's quick-start guide and the interior of the battery bay contain dire warnings that the power pack needs to be charged for whopping 24 hours before you can use it - or "YOUR PHONE MAY NOT WORK".

BT Granite

Do not touch for 24 hours... or else

Actually, the capitals are ours, but you still get the feeling this is not a warning you should ignore. Which is odd, given how 90 per cent of phone batteries require only a quick charge before they're ready. And this is a Lithium-polymer cell - not one of your old NiCads or NiMHs that you really did need to leave connected long after the charge light indicated they were good to go.

SANS - Survey on application security programs

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.