Feeds
60%
iDECT iHome phone

iDect iHome Android phone

The household handset meets the 21st century

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

As for call quality, I found nothing to complain about once I stopped holding the handset with the screen to my face like my mobile. Doh! Both incoming and outgoing calls where as clear as a bell and the ringer had plenty of volume on tap for the slightly Mutt and Jeff.

iDECT iHome phone

Versatile, but you only get the one handset

iDect reckons a full charge of the 910mAh battery is good for eight hours of talk time or 80 on standby, which seemed about right to me. However, leave the Wi-Fi radio on and you will halve those times.

Verdict


The absence of Google account sign-in, an aging version of Android and a less-than-pukka resistive screen and UI combine to take some of the shine off the iHome and at £99 with only one handset it’s not the cheapest cordless phone package around. On the other hand it’s very easy to use, looks good and does plenty of things your typical home phone is not capable of.

 ®

More Android Gear Reviews...

Binatone
HomeSurf 7
Archos
43
Ten... budget
Android smartphones
Samsung
Galaxy Tab

Security for virtualized datacentres

60%
iDECT iHome phone

iDect iHome Android phone

A DECT home phone driven the increasingly ubiquitous Android operating system.
Price: £99 RRP

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.