Feeds
85%

LG KU990 Viewty cameraphone

Give a phone a touchscreen and suddenly everyone's interested

High performance access to file storage

The menu system doesn’t take much getting used to at all, but it's not all plain sailing. Users may initially have a job working out when the scroll bar at the side of the screen can and can’t be used, for example. For some menu options and applications you need to use the jog wheel on the back of the phone to scroll through menus rather than moving your finger on the screen. Unless you’re an instruction book junkie, you won't necessarily know which to use and when.

Although there’s an element of this trial and error exploration with any new phone, some functions where the scrolling isn’t integrated fully – like text message writing – can be frustrating. And the positioning of the finger-controlled jog wheel on the back of the phone makes it less ergonomically agreeable than a side-mounted thumb-wheel alternative.

LG KU990 Viewty mobile phone
A good platform for video playback

Speaking of messaging, LG has delivered several text input options, including handwriting recognition, a virtual Qwerty keyboard and a regular phone texting numberpad. Handwriting recognition ranks among those love-it-or-hate-it features, but with practice it seemed successful with our (admittedly poor) scrawl.

The Qwerty keyboard worked pleasingly too after we’d got into the swing of it. The letters are pretty small but enlarge when you tap them, kind of iPhone-fashion, so you can see that you’ve connected with the correct key. In addition to text and MMS messaging, the Viewty does email. Attachments can be viewed on the superb, fast-operating Picsel-sourced document viewer.

The KU990 has a very capable music player inside that offers decent quality playback and a good looking and straightforward user interface. Shame about the lack of a standard headphone socket, but stereo Bluetooth is ready to use if you have a pair of wireless headphones. You can listen to music through the speaker, but it’s as limited as mobile speakers usually are. The handset has an FM radio too.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.