Feeds
85%

LG U970 Shine mobile phone

Why do new products sound like WWII submarines?

3 Big data security analytics techniques

Review Part of LG's Black Label series (sounds like a whisky), which also includes the KG800 Chocolate, the U970 features a brushed metal casing and a mirror effect display that makes it look more like an exquisite sculpture than a 3G, 2-megapixel camera and MP3-enabled phone.

The U970 has a slider style handset, which opens with sickening smoothness to reveal a compact Motorola Razr-style keypad. The sliding movement requires a greater than average thumb push to open, which means it won't slide open in your pocket. The metal body also gave us confidence that the handset was robust and could survive the odd bump and knock.

LG U970 Shine mobile phone

The 240 x 320 pixel QVGA display screen is the handset's best aesthetic feature. It provides a clear resolution of up to 262,000 colours when in use and transforms into a mirrored surface when in standby or slid down, making it perfect for the more image conscious mobile users.

In addition, its slim dimensions, 9.98 x 5.06 x 1.37cm and 119g weight, mean it is very jean, shirt, and suit pocket friendly. A scroll wheel underneath the screen is used to browse through and select menu options. This is fine when, for example, just browsing the internet, but having to push down on the scroll wheel to select options meant we often selected something different to the one wanted, which quickly became very annoying. Two soft keys for alternate menus also feature on either side of the scroll wheel.

It seems a slight fashion faux pas that LG has decided to cram all the U970's shortcut keys onto its left-hand side. There are two selection buttons that serve a myriad of purposes, including adjusting the in-call volume and browsing through the main menu, one for main menu access and another for the camera.

Lift a silver flap, also on the left-hand side, and you're able to plug in the power charger. Unfortunately, the port also doubles up as the headphone jack and USB port though, meaning we were unable to charge, listen to MP3s, and transfer data at the same time.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.