Feeds
90%

Sony Ericsson W880i slim phone

No compromise on functionality?

7 Elements of Radically Simple OS Migration

Review Ultra-slim phones are a gimmick, right? Yes, they're mere millimetres from front to back, but in shaving off around half the thickness of a standard candybar, the phone makers must have compromised on the skinny handset's feature set, surely? Sony Ericsson's Walkman-branded W880 is now readily available - we look at how well it measures up.

Sony Ericsson W880 - front view
Sony Ericsson's W880: Nano-esque

First impression: the W880 is a thing of beauty. Edge-on it's just 9mm thick. That doesn't just make it look sexy, it also makes it really comfortable to hold. The face measures 10.1 x 4.5cm so it's wide and tall enough for an eminently thumbable keypad, a decent sized display and the 0.3-megapixel videocall camera. Neither dimension is particularly small, but that slender waist makes the W880i feel incredibly compact.

The handset's no less rugged for its svelte good looks. There's a surprising solidity to the W880, though it's no heavyweight - a mere 71g, in fact. Just picking it up and holding it in your hand gives the impression that the insides are tucked away tightly and securely. That's largely due to the stainless steel black faceplate - this isn't a phone that seems like it'll snap in two if you push too hard. The back of the phone is kitted out in rubberised plastic, coloured in the Walkman series' signature orange. It gives the W880 a tactile, quality feel.

Unusually, the W880's microphone is on the front of the phone, not its base. You won't find the standard Sony Ericsson connector down there either - it's been rotated through 90° and placed on the left side adjacent to the tiny rubber cover that protects the Memory Stick Micro - aka M2 - memory card slot.

My W880 came with a 1GB card pre-installed - the biggest size the card can take, alas - and the phone has 16MB built in. We took the M2 card out for a peek, but wished we hadn't - it proved a real pain to get back in. We had to use a pencil to push it far enough in for the locking mechanism to click into place. This is not an expansion system for folk with fat fingers or very short nails.

Build a business case: developing custom apps

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?