Feeds

Ten weird Chinese mobile phones

Star-shaped, quad-SIM and sports car phones

Security for virtualized datacentres

Jinpeng A1308 love heart handset

RH Numbers

‘Lady phones’ are a sub-genre all on their own among Chinese phone-selling sites, usually offering some extra bling, a rounded shape or pastel hues.

The Jinpeng A1308 Dual-band Dual-Card Cell Phone’s pink plastics and heart-shaped buttons might just make it the ultimate expression of the genre.

Doesn't the lassie in your life deserve this instead of an iPhone?

Jinpeng A1308 love heart handset

Price $74 (£46)
More info Chinabuye

Lapland Tech i5

RH Numbers

We'd love to know the back story behind the name Shenzhen Lapland Technology Co, but the manufacturer's origins are obscure. We will therefore have to make do deducing the rather more obvious source of inspiration for the simply-named i5 phone it sells.

This Android 2.3.6 machine boasts dual SIMs, and its radio is said to play without a special earpiece. Plenty of others have gone down a similar route with iPhone look-alikes. Most run Android. Some run Windows Mobile.

The only reason we can think of to acquire one is to see if you can convince anyone you've got a hypervisor running on your handset.

Shenzen Lapland Technology Co's i5 iFauxn

Price $TBC
More info Alibaba

Top 5 reasons to deploy VMware with Tegile

Next page: N688 watch phone

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.