Feeds
85%

LG U970 Shine mobile phone

Why do new products sound like WWII submarines?

Choosing a cloud hosting partner with confidence

Hand-in-hand with the U970's 3G capability sits its HSDPA technology that provides internet x-HTM access at monstrous 3.6Mbps in UTMS mode. Internet content and features, such as games, music, and news are service provider dependent, but 3's network served up a varied selection - we even downloaded a full music track in about 35 seconds.

LG U970 Shine camera

Unfortunately, the phone is again let down by image quality. While watching video clips, the video was juddery, blurred, and frequently interrupted by breaks in service or buffering.

Our interest in download content lapsed quickly as a result, so we switched to the handset's music capabilities. LG provides software to turn the U970 into a music player and, although it's no match for the iPod's ease of use, the ability to recognise multiple music formats including MP3, AAC, and AAC+ is a strong plus.

The U970 is also polyphonic, but the lengths LG has gone to in understanding the handset's target audience (posers, WAGs' and the odd magpie) are highlighted by its ability to stream music in Bluetooth A2DP stereo to a compatible Bluetooth headset (not included).

With data storage levels continuing to rise across all IT platforms, we were shocked not to see any available memory card ports on the U970. The handset does have a whopping 575Mb internal memory though, but requires connection to a PC via a USB cable (supplied) to transform it into what LG calls a software-free "mass storage device" for dropping music, photos, and videos onto the memory.

This feature is fine if you are willing to continually carry your USB cable in the event you should wish to swap Artic Monkeys for Babyshambles, but if not then the lack of a storage card is a pain.

A server synchronisation feature caught us by surprise because the U970's looks and feels out of synch (pun intended) with such a relatively advanced feature and target market. After several attempts we failed to get the feature working though, but were reassured by the handbook that we should theoretically be able to synchronise the phone's data with that on a server, such as contacts, and to "do items" via a wireless network.

Internet Security Threat Report 2014

Next page: Verdict

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD to DIE, and this is WHY
Apple, er, couldn’t get the parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.