Feeds

Microsoft to launch incompatible telephone

Inconceivable!

3 Big data security analytics techniques

Microsoft will be launching a feature phone with Verizon Wireless in the US, based on Windows CE but not compatible with the forthcoming Windows Phone 7 Series.

Rumours of a Microsoft feature phone have been knocking around for a while. It was codenamed "pink" and supposedly built to replace the venerable Sidekick using the skills Microsoft acquired when it bought the previous owner, Danger. But now Gizmodo has photographs and technical details of two handsets to be launched in July on Verizon, proving that Microsoft has eyes on much more than the smart phone market.

Even from the scant details available it's clear that neither handset is Windows Phone 7 Series - despite having lots of social networking hooks and the ability to download applications. Those applications will be developed using .NET, but without the feature set of 7 Series, and probably only in partnership with Microsoft.

According to tips received by Gizmodo the two handsets, both of which feature the sliding keyboards so beloved by Americans, are based on Windows CE but with a different graphical layer and fewer features than 7 Series. They are also CDMA devices, which realistically limits them to the US at launch, though a GSM variant is always possible. The handsets clearly don't conform to the physical requirements for a 7 Series phone, and are unlikely to be as highly-specified.

It shouldn't really come as a surprise that Microsoft is paying attention to the "feature phone" end of the market - that's where everyone else is looking these days. Samsung's Bada is aimed squarely at providing downloadable applications to feature phones, and Qualcomm's BREW is being reinvented as the solution to that problem too, not to mention that it's where Symbian is hoping to make its new home now that MeeGo has moved in upstairs.

The problem for Bada is that for the moment it needs the same processing power as a smart phone, while Symbian and BREW are much more suited to that market. Microsoft's ability to do things with limited resources is somewhat patchy. The company has generally preferred to wait for the hardware to get cheap enough for its software, but this time it's Apple that's depending on the trickle-down effect while Microsoft attempts to fit a quart into a pint pot. ®

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.