Feeds
55%

Sony Ericsson P990i smart phone

How the mighty has fallen...

High performance access to file storage

Performance and reliability

Early adopters have already discovered a very telling feature (or bug) with the P990i. If you play the demo video and then pause it, this disables the UIQ transitions. The result is a fast and responsive phone. It makes the UIQ woes all the more apparent, for the underlying system seems well up to the tasks it's asked to handle, such as contacts look-ups, and fetching and rendering web pages. The 208MHz ARM processor processor running Symbian OS 9.1 was much more responsive than devices equipped with a 400MHz Xscale processor, lumbering under the burden of Windows Mobile.

But more immediately troubling is that even after all the delays, and using firmware refreshed only a week ago, the production model was incapable of being relied upon to complete the most basic tasks.

This is the buggiest production device your reviewer has ever encountered. The only similar experience was with the Nokia 7710, where the problem was performance: it took a lot of tuning and two major firmware updates to bring it up to an acceptable level.

In its current state, the P990i hangs when, in flip-closed mode, you choose to add a new contact, task or appointment, then open the flip - which you might want to do to create it with pen input or the keyboard. The phone remains in this state for several minutes, which may as well be considered a system crash. A reboot requires the battery to be removed, as the white screen doesn't allow a graceful shutdown.

Opera on the P990i: default view shows much less text than before
Opera on UIQ 3 doesn't show much text...

 

Opera on the P990i: full screen isn't much better
... while full-screen mode isn't much better

The phone regularly hung when retrieving email, when surfing, or when fetching RSS feeds. WLAN configuration was mercifully simple compared to Nokia recent implementations - but the phone often failed to retain the settings for our closed network between reboots.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.