Feeds

T-Mobile raises Sidekick from the dead

Microsoft meltdown (not) forgotten

Seven Steps to Software Security

T-Mobile resumed sales of its benighted Sidekick smart(ish)phone on Tuesday morning, six weeks after a cloudburst swamped the once-popular status symbol.

In early October, a catastrophic server failure at a Microsoft subsidiary - the all-too-prophetically named Danger - wiped out Sidekick users' personal data that had been stored on the company's cloudy system.

Although the failure was Microsoft's, the damage was borne mostly by T-Mobile, which suffered a debilitating knee in the PR groin due to the loss of faith by its Sidekick customers.

Whatever the cause of the original server suicide, the follow-up data restoration - or, to put it more accurately, the lack of same - vacillated between embarrassment and farce.

And T-Mobile thought the Paris Hilton hacking was damaging to its reputation.

There was a silver lining to this particular cloud, however - although one that may not have been glimpsed by T-Mobile, Microsoft, or Danger: It got people talking about whether cloud-based storage is truly worthy of trust, and whether a data-safety code of practice should be instituted among cloud service providors.

But such talk is too late for Sidekick users. And, possibly, too late for the Sidekick itself - a handset which, as The Reg has pointed out, relies heavily on server-based storage.

So T-Mobile is again offering the Sidekick for sale: the Sidekick LX 2009 at $149.99 and the Sidekick 2008 for $49.99, both with a two year contract.

But after the events of the past six weeks, will anyone care? ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.