Feeds

Ten... smartphone survival accessories

Protect and deploy

High performance access to file storage

T-Tech by Tumi International Travel Adapter

RH Numbers

It may be obvious to pack an adaptor for charging your device abroad, but with an abundance of these on the market, the right choice is crucial, particularly if you're always hopping between regions.

Those with the cash might like to look forward to this T-Tech by Tumi, released next month, which features slide out power plugs for Europe, the US, Australia and Asia. There's an AC socket, as well as two USB 2.0 ports, which deliver enough power for tablet devices.

OK, so you'll still need to bring a USB cable or power lead, for which you might want to chew over a tangle-saving retractable setup such as the aforementioned OneCable, however the T-Tech looks unrivalled when it comes to AC adaptors, winning an innovation award at CES 2012.

Of course, there are plenty of more inexpensive options available too, such as these adaptors from ReTrak. It all depends on how much you're willing to splash and the destination of your holiday, really.

T-Tech by Tumi International Travel Adapter
Mobile logo
Price £TBD
More info Jasco

Vodafone Sure Signal

RH Numbers

If you know you'll be in a remote area without a decent 3G signal, a Femtocell can utilise a nearby broadband hub to produce the connection you need.

Vodafone offers such hardware with its Sure Signal service, which utilises a box built by Alcatel-Lucent and lets you route incoming and outgoing calls through t'internet. Some 32 numbers can be registered to use the device, with four handsets able to connect simultaneously. As long as the network connection is 1Mb/s or faster, the femtocell will run smoothly, apparently.

With 3G connectivity so vastly spread, Femtocell tech is rather niche. Still, it's nice to see Vodafone stick with it, Three's version has just rolled out, and O2 is following suit after trials with the tech late last year. You can read Bill Ray's assessment of Vodafone's first Sure Signal box here on Reg Hardware.

Vodafone Sure Signal
Mobile logo
Price £50
More info Vodafone

High performance access to file storage

Next page: Waterproofing

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.