Feeds

Qwerty Keyboard Smartphones

Nine phones for typing on

  • alert
  • submit to reddit

Security for virtualized datacentres

Group Test Despite the increased screen sensitivity of large-display smartphones such as the iPhone, many of us still prefer to have a good, solid keyboard with real, tactile keys for texting, firing out emails or composing our memoirs.

While predictive text systems like SureType or T9 can be fast, they can also be a pain, so there's really no substitute for a fully-specced Qwerty keyboard if your messages need to go beyond the Twitter level.

Sony Ericsson Aspen

With so many Qwerty smarrtphones doing the rounds at the moment, we thought it was high time we sifted the wheat from the chaff to see what you're actually getting for your money, and what you need to watch out for.

Under consideration today are:

We've taken a look at BlackBerry-style candybar handsets and smartphones with stow-away keyboards too. We've got Android, Symbian and Windows Mobile devices, and phones with their own, dedicated OSes.

But before we look at the user experience each of these Qwerty-equipped handsets offers, here's our Buyer's Guide to steer you through the product category's pros and cons...

Next: Qwerty Smartphones Buyer's Guide

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.