Feeds
60%
iDECT iHome phone

iDect iHome Android phone

The household handset meets the 21st century

  • alert
  • submit to reddit

SANS - Survey on application security programs

Review As well as smartphones and tablets Google’s Android operating system has started cropping up in media players, ski goggles, car stereos and even headphones, so it’s perhaps not too surprising that it’s now turned up in the humble landline home phone.

iDECT iHome phone

Powered by Android, built by Binatone: the iDect iHome Phone

Rather more futuristic and stylish than your average dog and bone, the iDect (by Binatone) iHome Phone consists of a rather smart circular base complete with built-in speakerphone and digital answering machine. The all-important touchscreen handset sits atop of all this to recharge.
 
The handset is a solid and pleasantly proportioned lump with physical back, menu and call keys plus a four-way navpad, all arranged below the 2.8in LCD panel or to the right of with the screen when in landscape position.

Nice though the handset is, you only get the one and I couldn't find a way of buying any more. Other DECT (Digital Enhanced Cordless Telecommunications) compatible handsets will of course work, but that’s not the point, for £100 two handsets should be included.

Compared to the often labyrinthine menu systems of some home phones the iHome is blindingly easy to set up and use. It’s certainly the first cordless phone I’ve come across that doesn’t require you to keep the user guide for future reference.

From making calls to hooking up to your home Wi-Fi network or browsing the web, the iHome operates in exactly the same way as any other Android handset. Alas, the absence of the Google stamp of approval means you can’t sign in to access your account contacts – a significant drawback in a telephone.

iDECT iHome phone

Simple controls and navigation

What you do get though are all the other basic Android niceties such as a web browser, e-mail client, music player, Internet radio app, e-book and RSS readers and a selection of widgets. I’m not sure most people need all these things on their home phone handset, but like condoms and snow chains, I suppose it’s better to have them and not need them than the other way around.

SANS - Survey on application security programs

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.