Feeds
90%

Apple's second-generation iPod Nano

More a remixed re-issue than a bold new album?

Choosing a cloud hosting partner with confidence

The new Nano is a step backwards, of course. A year ago, Apple made such a big deal about the risk of setting aside the popular iPod Mini in favour of the then new slimline Nano, but now we find it going back to the Mini look, right down to the metallic shell, rounded sides, white plastic top and bottom, and the colour scheme...

apple ipod nano second generation

Of course, having established the black and white pairing and seen it emulated during the last 12 months by a thousand electronic devices, Apple has little choice but to make a change if it's to stay ahead of the game, and at least this time round the colours are bold, not the gentle pastel shades of the Mini.

In your hand, the Nano remains as tiny as ever. Old and new models aren't identically dimensioned, but the difference is marginal. The new version has the rounded sides of the Mini rather than the flatter sides of the first-generation Nano, but it doesn't make the new device seem any smaller, or any more comfortable to use, I found. It's not like the first Nano's edges were harsh, as they were on the very first hard drive-based iPods.

Round or flat is a matter of personal preference, of course. However, all Nano users are likely to appreciate the new model's larger Hold slider, which is easier to move than its predecessor, though it isn't raised any further above the top of the player.

On the base, the earphone socket is once again placed on the left-hand side, but it's slightly further away from the dock connector than was the case with the original nano, so expect to have to replace some of your accessories if you upgrade to a 2G model.

apple ipod nano second generation

The click-wheel works much as before, but there's a neat new touch: the central button is slightly concave, which makes it easier to locate and press by touch alone, and simply feels better. It's second only to having a raised centre button, but at least there's no risk here of accidental presses.

Internet Security Threat Report 2014

Next page: Verdict

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.