Feeds
90%

Apple iPod Touch

Finger-flicking good?

High performance access to file storage

2007's Top Products Apple may be keen to tout the Touch's 3.5in display, but the first thing you notice about the new iPod is how thin it is. Front to back it measures 8mm - on paper not as thin as the 6.5mm thick iPod Nano, but you'd never really know unless you measured them both. The point is, the Touch is supremely skinny.

It's hard to describe the Touch without constantly referring to the iPhone, so closely do the two resemble each other. The Touch's display is surrounded by black plastic, and both screen and bezel do indeed appear to be protected by a sheet of glass. Below the screen is the Home button, and bordering the player is gunmetal-grey edging onto which the iPod-standard chrome-look backplate clips.

Apple iPod Touch
Apple's iPod Touch: iPhone-inspired

The top left corner of the Touch's backplate has been cut away to make room for a plastic cover that allows Wi-Fi signals to pass through. The wireless window on the iPhone is larger, but it covers the bottom tenth of the backplate, so it's somehow less conspicuous than the one on the Touch.

The Touch has the same user interface as the iPhone, though Apple's rearranged the icons into a more appropriate order for an iPod. At the bottom of the screen is the player's Mac OS X-style Dock, this time rendered as transparent sheet reflecting the icons that are sitting on it: Music, Videos, Photos and iTunes, the latter for the download store.

Above them, at the top of the screen, are the other applications: Safari, YouTube, Calendar, Contacts, Clock, Calculator and Settings. Contacts is new, providing the same access to your address book that the iPhone's Phone app does. Despite the Touch's wireless connectivity, the iPhone's useful Weather app isn't present. Worse, there's no Mail either.


Sleek and svelte

Nor is there the ability to add Contacts and enter new appointments into the Calendar. In that sense, the Touch is more akin to the old Palm Pilot that more recent PDAs - it's a device for taking your personal information with you rather than a data-entry tool. And it's no different from past iPods that have been sync'd with contact details and diaries.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.