Feeds
75%
Samsung miCoach

Samsung Adidas F110 miCoach personal trainer phone

Pint-sized Mr Motivator

High performance access to file storage

You can press blindly through the armband, as the miCoach's buttons are large enough to avoid fiddly mistakes. A voice guides you through the workout, giving you updates as you go along, and reporting on your performance at the end. You can compile a list of "motivation songs" for when you need that extra bit of effort – a long press of the central selection key will pull up one at random to give you that Eye of the Tiger moment.

When the workout’s over, extensive data from your run is displayed and stored by the system, and each workout is added to a dedicated miCoach calendar. You can pull up info for any day, if you want to check your progress.

Samsung Adidas F110 miCoach sliderphone

Tapping the runner-icon button produces a carousel of six icons

You can schedule a variety of different workouts yourself in the miCoach application, adjusting your goals with a complex series of settings adjustments. However, the real beauty of the miCoach system comes when you synchronise is with your PC - there's no Mac software - and the miCoach website.

Data from your run is uploaded and displayed on the site in detail – so you can monitor on graphs your heart rate, pace and over the course of individual workouts. More importantly, you can set goals for your training – whether it’s to start running, get fit and stay fit, lose weight, get fit for a race, improve race times or boost speed. A coaching plan can be synced with your phone, taking into account your fitness level assessment, days you’re able to workout and the goals you've set. The programme is then loaded onto your phone.

These coaching programmes can run for several months, with a wide variety of training runs included. The miCoach application is nothing if not ambitious.

The coaching extends to narration as you’re running, with the app's voice advising you when to increase speed or slow down, and offering you guidance and updates as you progress through the session. For nearly all of us amateurs who assume you just have to keep running more to get fit, the system really helps by bring forward ever more refined training methods.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.