Feeds
74%

Motorola MOTO U9 mobile phone

Fashion-conscious design can only get you so far

High performance access to file storage

Review Motorola has refreshed the PEBL concept with the MOTO U9, another stylish clamshell with a glossy front and external music player touch controls. But is this tune-playing mobile the one to get Motorola back on track with the fashion phone crowd?

Motorola’s been here before with the rounded look, smooth-feel mobile, when it first skimmed its PEBL U6 onto the market a couple of years back. With the afterglow of the RAZR’s iconic success now very much faded, Motorola has introduced the PEBL-alike MOTO U9, an updated take on the design. The U9 has a similar rounded shape, but packs more features and has a few eye-catching touches to distinguish it.

Motorola Moto U9

Moto U9: a more conventional open-and-shut clamshell

It doesn’t have the addictive slide and spring open flip mechanism of the PEBL, nor the tactile rubberised all-over shell - it's a more conventional open-and-shut clamshell. There’s that rubber feel on the back of the phone, but the front now has a mirrored metallic paint-job-on-plastic look, with a hidden external display that appears to glow out of the casing when active. This shows calls and messages and can be used as a viewfinder for the camera, but also displays the music player, with touch-sensitive controls appearing under it to play, pause and skip tracks.

None of this is particularly new or novel - the mirrored shell with hidden screen echoes Sony Ericsson’s Z610i from 2006, while Motorola has had touch-activated music player controls on last year’s RAZR2.

Targeted as a fashion phone and available in purple, pink or black, the attractions of the U9 are quite obvious and upfront – the shiny look and feel. It's a brasher look than the elegant charm of the PEBL, and pitched at the sub-£100 mark on pre-pay, it’s aimed at mass-market pick-up - though it faces stiff competition at this price point.

High performance access to file storage

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.