Feeds
75%

Pebble micro MP3 player

Does it rock?

High performance access to file storage

First UK Review Pebbles - you can skim them across waves, 'decorate' the front of your house with them, even make phone calls with them. And now you can play songs on them too. Well, sort of. UK-based digital music player retailer Advanced MP3 Players (AMP) has come across a small, pebble-shaped device and it's chosen to market the South Korea-sourced product under its own name. Given the player's size and shape, what else could AMP call it?

advanced mp3 players' pebble

The Pebble is one of those players that make a virtue out its size - or lack of it. But wear it around your neck or your belt - a neat, adjustable lanyard and a belt-clip come bundled - the Pebble isn't meant to go unnoticed. It's bright, chrome-like face and the blue light that blinks its way around and around the circular control cluster during playback are very eye-catching.

The device's oval-shaped face is a mere 4.5 x 3cm. The control is reminiscent of the iPod Shuffle's: a central play/pause key surrounded by a four-way circular button that raises or lowers the volume, or skips tracks forward or backward depending on where you press it. Press anything and the tiny OLED screen glows through the chrome to reveal playback times and mode, song title and other encoding rate, EQ selection, battery status and so on.

The lanyard anchor loop's at the top, just in front of the 3.5mm earphone socket which doubles up as the player's USB port. Below it is a hole which too has a dual role: microphone and recessed reset button. Each side has a button too, again with twin functions - press quickly for one, or press and hold for the second. On the left-hand side the functions are track navigation and hold; on the right, they are Rec and Menu. Since the latter's more likely to be used than the record facility, I'd say it should have the short press for activation not the long one, but that's a minor gripe.

The Rec button actually has a third function: press it while there's a song on and the player changes its repeat-play setting. To do recording, you first have to turn your music off. Whatever you're using the player for the controls are small enough to be discreet, big enough to be easy to use.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.