Feeds
85%

Motorola Z8 'kick slider' media phone

Does this 'multimedia monster' shape up?

Gartner critical capabilities for enterprise endpoint backup

Yes, the Z8 also uses the Symbian UIQ interface - version 3.1, in point of fact - but nowhere does Motorola mention that this is a smartphone. UIQ is a pen-based interface that Motorola has used in the past - for the first Hutchison 3G phones - but the Z8 is the first phone to use the soft-key variant. There's no touchscreen, in other words. It soon becomes apparent that Motorola, like the Japanese manufacturers, has chosen Symbian as a base primarily for performance reasons. The Z8 is a top-class performer, with none of the performance lags experienced on many recent smartphones. And this is particularly true for video, which it handles with the grace and reliability of Christiano Ronaldo falling over in the opposition's penalty box unchallenged.

Z8: the applications deck in List view Z8: the applications deck in Grid view
So we've figured out how to open the phone - what does it do?

In theory, UIQ also gives the Z8 application compatibility with third-party applications - but this is a new implementation of the UI, and so it's a rather more complicated picture. We'll go onto application compatibility further on.

Motorola bundles the Z8 with a Bluetooth stereo headset, a full-length movie... and Sky Anywhere, the remote control for your BSkyB box. The device is entirely focused around media playback and control, in other words, a focus that's reflected throughout.

Video playback is very impressive: at 30 frames per second it's a higher framerate, and a more fluid experience, than TV or DVD. The pin-sharp display means even subtitles are readable. Or put another way, you might even be able to recognise the features of Matt Damon, as the movie The Bourne Identity is bundled with the phone. Full-length movies pause and resume instantly after being dispatched to the background - although this does screw up the audio sync on the soundtrack. We found a couple of stop/starts were usually enough to resync video and audio.

Boost IT visibility and business value

More from The Register

next story
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
The agony and ecstasy of SteamOS: WHERE ARE MY GAMES?
And yes it does need a fat HDD (or SSD, it's cool with either)
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.