Feeds

Motorola flips out candybar Android Twitterphone

Will Charm win over BlackBerry buffs?

Security for virtualized datacentres

Having now released the Flipout social networking phone, Motorola has announced another Qwerty keyboard-equipped Android-based smartphones for Twitbook buffs.

Dubbed the Charm, the rather BlackBerry-esque handset sticks screen - a 2.8in job - and keyboard on the same panel, unlike the Flipout, which tucks keyboard behind screen, as you can read in our review.

Motorola Charm

The 98 x 67 x 11mm, 110g Charm may run Android 2.1, but Motorola's own Motoblur integrated social networking front end comes to the fore.

There's a 3Mp camera on the back, 802.11n Wi-Fi, and a second microphone to help filter out background noise during calls.

The 320 x 240 screen is multi-touch enabled and sports what Motorola calls "Kodak Perfect Touch tech for better, brighter pictures". We can't say what it actually does for snaps, but it presumably steers Motorola clear of the legal battle Kodak has been waging with Apple, RIM and co. over who owns picture preview technology.

Motorola Charm

The Charm is currently set to ship in the US through T-Mobile this summer. That's of no help to Reg Hardware's UK readers, but we reckon that Charm - or a remarkably similar handset with a different name; Strange, Up, Down, Top or Bottom, perhaps - will be out over here in due course. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.