This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Handset includes camera for viewing and editing video clips.
Nokia on Thursday launched its first third-generation wireless phone handset, the 6650. The company bills the phone as the first third-generation-compliant phone capable of working on both of the two major mobile-phone protocols used around the world.
Because it works on both GSM (Global System for Mobile Communications) and WCDMA (Wideband Code Division Multiple Access) networks, the 6650 will work on next-generation mobile networks being rolled out in the United States, Europe, and Asia, according to Nokia, the world's largest mobile handset manufacturer.
In addition to voice calling, the 6650 offers several flavors of mobile data connectivity, such as a Wireless Application Protocol browser and Java support. For connecting the phone to other devices, it has a USB interface and Bluetooth and infrared links.
The phone also includes a large color display screen and a built-in camera for taking still pictures and recording up to 20 seconds of full-motion video in 4,096 colors with associated audio, according to Nokia. Pictures or video taken with the phone's camera can be stored on the phone or sent to a compatible mobile phone or an E-mail address.
Nokia expects to deliver the first of its 6650 phones for tests by mobile operators in the fourth quarter, with commercial shipments beginning in the first half of next year. The 6650 weighs just under 5 ounces, has 7 Mbytes of dynamic memory, and will be priced from about $250 to $750.
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
The State of IT & Cybersecurity Operations 2020Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!