Feeds

Win an HTC Touch Diamond2!

Last call for iPhone botherer promo

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Reg Lucky Draw The Register has teamed up with our retail partner eXpansys to give one lucky reader the chance to get his or her hands on HTC's best handset yet, the Touch Diamond2.

The Touch Diamond2 features a lovely 3.2-inch, 480 X 800 touch sensitive screen and Quad-band GSM/GPRS/EDGE and HSDPA/WCDMA connectivity to keep you in touch. A 5.0 megapixel colour camera with auto focus lets you take pictures with clarity. The handset comes equipped with 512mb of on-board memory with a microSD slot under the cover which can handle cards of up to 16GB.

We like the handset and believe it to be the best alternative to an iPhone yet. You can read our review here.

In short then it's a great do-it-all handset, and it could be yours for free. Putting up the prize is eXpansys, a leading retailer of smartphones and wireless handheld devices.

So what's the catch? You have to sign up to receive The Register's White Paper updates, a weekly email newsletter that delivers the latest research and resources from our library direct to your inbox.

A winner will be picked at random from the entrants; the closing date for this draw is Midnight GMT, Tuesday 23rd June.

To be in with a chance of winning and receive the latest tech resources and product news in your inbox, get stuck into the sign-up form.

Terms and Conditions

The Register, HTC Touch Diamond2 competition is open to all readers of The Register. No purchase necessary, but winners may need to agree to an airtime contract and/or service subscription to use the device for phone calls and email.

The Competition is not open to employees of eXpansys or Situation Publishing Ltd, their families or agents. Multiple entries will be disqualified. Only one entry is permitted per household. Only one prize will be offered per winner. No cash alternatives will be offered. The prize is subject to availability and if, due to circumstances beyond The Register’s control, we are unable to provide the stated prize, an alternative prize of equivalent value will be supplied. The Register will not be liable if the prize does not reach the winner for reasons beyond our control, or if the prize is damaged during delivery.

Winners will be notified by email with 28 days of the closing date, and must respond within one week. Winners who do not respond within this time may be disqualified and an another winner drawn. The editor's decision is final, and no correspondence will be entered into. Closing date: Midnight GMT, Tuesday 23rd June.

By entering the competition you agree to pass on your personal details to The Register and eXpansys, which will email you periodically. You can unsubscribe from these emails at any time.

Application security programs and practises

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Microsoft confirms secret Surface will never see the light of day
Microsoft's form 8-K records decision 'not to ship a new form factor'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.