Feeds
90%

Sony Ericsson W880i slim phone

No compromise on functionality?

Choosing a cloud hosting partner with confidence

Review Ultra-slim phones are a gimmick, right? Yes, they're mere millimetres from front to back, but in shaving off around half the thickness of a standard candybar, the phone makers must have compromised on the skinny handset's feature set, surely? Sony Ericsson's Walkman-branded W880 is now readily available - we look at how well it measures up.

Sony Ericsson W880 - front view
Sony Ericsson's W880: Nano-esque

First impression: the W880 is a thing of beauty. Edge-on it's just 9mm thick. That doesn't just make it look sexy, it also makes it really comfortable to hold. The face measures 10.1 x 4.5cm so it's wide and tall enough for an eminently thumbable keypad, a decent sized display and the 0.3-megapixel videocall camera. Neither dimension is particularly small, but that slender waist makes the W880i feel incredibly compact.

The handset's no less rugged for its svelte good looks. There's a surprising solidity to the W880, though it's no heavyweight - a mere 71g, in fact. Just picking it up and holding it in your hand gives the impression that the insides are tucked away tightly and securely. That's largely due to the stainless steel black faceplate - this isn't a phone that seems like it'll snap in two if you push too hard. The back of the phone is kitted out in rubberised plastic, coloured in the Walkman series' signature orange. It gives the W880 a tactile, quality feel.

Unusually, the W880's microphone is on the front of the phone, not its base. You won't find the standard Sony Ericsson connector down there either - it's been rotated through 90° and placed on the left side adjacent to the tiny rubber cover that protects the Memory Stick Micro - aka M2 - memory card slot.

My W880 came with a 1GB card pre-installed - the biggest size the card can take, alas - and the phone has 16MB built in. We took the M2 card out for a peek, but wished we hadn't - it proved a real pain to get back in. We had to use a pencil to push it far enough in for the locking mechanism to click into place. This is not an expansion system for folk with fat fingers or very short nails.

Beginner's guide to SSL certificates

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.