Feeds
70%
Acer_n311_tiny

Acer n311 Wi-Fi PDA

A feature-rich PDA - but is it worth the asking price?

High performance access to file storage

Review The introduction of the smart phone may be slowly killing off the PDA, but there are times when you need the larger screen of the handheld. The Acer n311, part of the n300 series, offers plenty of other interesting features too, but are they enough to make you want to splash your cash?

Acer_n311

The n311's stand-out feature is its large, 3.7in TFT display, which is very bright and easy to read, a feature helped by its 480 x 640, VGA resolution and the ability to display up to 65,536 colours. This makes it a rather wide device, but at least Acer has managed to keep the thickness down. Overall measurements are 11 x 7 x 1.4cm - any wider and it wouldn't be comfortable for most people to hold. It weighs in at 135g, slightly more than your average mobile phone.

Although the screen is the dominant feature, there are plenty more on offer. Let’s start with the design, which is actually rather good. The silver and black colour scheme works well. The battery has an aluminium lid, but it's a shame that the silver details appear to be plastic. Rather than a four-way navigation pad with a button in the middle, Acer has fitted a small joystick. It works quite well, but having recently reviewed the Orange SPV M600, which has the additional buttons under the screen alongside the Start and OK buttons, navigating around the n311 with one hand feels awkward.

Acer_n311_side

There are four buttons on the front - two on each side of the joystick - which are short cuts to the Today screen, the calendar, Outlook and your contacts. Oddly enough, Acer decided to have soft buttons for the calendar and the contacts on the Today screen, which is really pointless. The left side is home to the power button and a hold switch. On the top of the device is a 3.5mm audio jack for headphones, a slot that accepts SD, SDIO and MMC cards and, on the far right side, the stylus. At the bottom is a proprietary docking connector and a reset button.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.