Feeds

Nokia intros X series

New name, look for XpressMusic line

Remote control for virtualized desktops

Nokia didn't just unveil the N97 Mini this week, it also introduced its first X-series phones, the successors to its XpressMusic line.

Nokia X6

Nokia's X6: a new look for Comes With Music phones

The top-of-line model is the X6 and sports a 3.2in, 16:9 touchscreen and 32GB of storage capacity - there's no memory card slot - all in a 14mm-thick casing. Round the back is a 5Mp camera with Carl Zeiss optics and a twin-LED flash. The handset has Assisted GPS too and a TV port.

Nokia X6

Carl Zeiss lens work

For connectivity, it has HSDPA 3G, Wi-Fi and Bluetooth 2.0.

Nokia X3

X3: no touchscreen here, just a keypad

The significantly cheaper X3 makes do with a 3.2Mp camera and a 2.2in, 240 x 320 display. It's only a quad-band GSM/GPRS/Edge device too. But it does have an FM radio and a slide-out keypad. It has Bluetooth 2.1 and can take Micro SD cards.

Nokia X3

Not as svelte as its sibling

Both the X6 and X3 will go on sale in Q4, Nokia said. Pre-subsidy and pre-tax prices are €450 (£322/$663) and €115 (£82/$169), respectively. ®

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.