HTC 'Blue Angel' Wi-Fi PocketPC phone

Aka i-mate PDA 2k, O2 XDA IIs, Orange M2000 etc, etc


Reg review No company has done as much to advance Microsoft Windows Mobile telephony hardware than Taiwan's HTC. The company's smart phones have been offered by numerous vendors and networks, as have its phone-equipped PocketPCs, most notably as the O2 XDA family. And not content to find one good design and stick with it, over the last few years HTC has continued to evolve each line.

HTC's latest PocketPC design is codenamed 'Blue Angel'. It may sound like an escort agency, but that hasn't prevented it being picked up by Europe's key networks and plenty of others around the world. I looked at i-mate's PDA 2k, courtesy of Expansys, but the same hardware also appears as the O2 XDA IIs, Vodafone VPA III, T-Mobile MDA III, Orange SPV M2000 and other labels besides.

i-mate PDA 2k/HTC 'Blue Angel'Out of the box, Blue Angel looks like a standard PocketPC running Windows Mobile 2003 Phone Edition - it's actually packing Windows Mobile 2003 Second Edition Phone Edition, if you like long operating system names. There's the usual 320 x 240 3.5in transflective LCD, with a speaker/earpiece above it and five-way navigation control underneath. There are call-make and -break keys alongside the navigator - just above it are four slimline buttons each invoking the Start menu, email, Internet Explorer, and any dialog's OK or application's quit button, respectively. Either side of the speaker are the typical Contacts and Calendar application launch buttons, brought up to the top of the device, and network activity LEDs.

On top of the unit are the SD IO slot, power key and headphone socket. The latter is covered with a rubber bung that's nice and snug out of the box, but becomes too loose to be of use once you've uncorked it. The SD slot is equally poorly executed, with inserted cards flush to the surface of the PDA making it very hard to push the card in to release it - or to lock it during insertion - unless you have particularly thin fingers. Fortunately, there's plenty on on-board memory: 128MB of RAM, of which 125.8MB are available to the user. There's 46.3MB of built-in Flash storage, too.

Fortunately, the SD slot and the earphone socket are the limit of Blue Angel's duff design - the rest is much smarter. On the left-hand side panel, you'll find the usual voice recorder button along with a second control to activate the unit's adequate 640 x 480 digicam. Between the two buttons lies Blue Angel's volume control, a springloaded slider-switch that controls both the system sound-level and the ring volume through a pop-up menu. Below these controls you'll find Blue Angel's infrared port, the first of the unit's four wireless connectivity options.

The camera is on the back of the device, above the battery. A catch on the base releases the power pack, a 1490mAh job, which you have to remove to to insert your SIM card.

SIM card? Yes, wireless connection number two is a quad-band GSM/GPRS radio, switcheable between Class 8 and Class 10, providing voice communication and data networking. In addition to that, Blue Angel offers 802.11b Wi-Fi and Bluetooth. The latter's handy not only for hooking the unit wirelessly to a notebook, but to allow you to use a Bluetooth headset - essential, since PocketPC phones aren't exactly convenient for up-to-your-ear usage. I tried the unit with Motorola's new HS820 and it generally worked fine, though its range appeared limited compared to my standard Nokia 6600/Motorola HS850 set-up. The audio began to break up if I moved more than a metre from the PDA. Worse, there's no voice-tag support, so you have to get your PDA out of your bag whenever you want to make a call.


Other stories you might like

  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module
    Anything that uses proximity-based BLE is vulnerable, claim researchers

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

    Essentially, what happens is this: the paired smartphone should be physically close by the Tesla to unlock it. NCC's technique involves one gadget near the paired phone, and another gadget near the car. The phone-side gadget relays signals from the phone to the car-side gadget, which forwards them to the vehicle to unlock and start it. This shouldn't normally happen because the phone and car are so far apart. The car has a defense mechanism – based on measuring transmission latency to detect that a paired device is too far away – that ideally prevents relayed signals from working, though this can be defeated by simply cutting the latency of the relay process.

    Continue reading
  • Google assuring open-source code to secure software supply chains
    Java and Python packages are the first on the list

    Google has a plan — and a new product plus a partnership with developer-focused security shop Snyk — that attempts to make it easier for enterprises to secure their open source software dependencies.

    The new service, announced today at the Google Cloud Security Summit, is called Assured Open Source Software. We're told it will initially focus on some Java and Python packages that Google's own developers prioritize in their workflows. 

    These two programming languages have "particularly high-risk profiles," Google Cloud Cloud VP and GM Sunil Potti said in response to The Register's questions. "Remember Log4j?" Yes, quite vividly.

    Continue reading
  • Rocket Lab is taking NASA's CAPSTONE to the Moon
    Mission to lunar orbit is further than any Photon satellite bus has gone before

    Rocket Lab has taken delivery of NASA's CAPSTONE spacecraft at its New Zealand launch pad ahead of a mission to the Moon.

    It's been quite a journey for CAPSTONE [Cislunar Autonomous Positioning System Technology Operations and Navigation Experiment], which was originally supposed to launch from Rocket Lab's US launchpad at Wallops Island in Virginia.

    The pad, Launch Complex 2, has been completed for a while now. However, delays in certifying Rocket Lab's Autonomous Flight Termination System (AFTS) pushed the move to Launch Complex 1 in Mahia, New Zealand.

    Continue reading

Biting the hand that feeds IT © 1998–2022