Feeds
90%

SanDisk Sansa Fuze

Small but perfectly formed

High performance access to file storage

Thankfully, the Fuze doesn't make much of a palaver of integrating the memory card data with content held in the main memory. We filled our 4GB test player then slotted in an equally full 4GB Micro SDHC card in. The player took 20 seconds or so to get its act together and combine the two into a single media library. That figure will probably rise - a lot - when it comes to combining larger amounts of on-board and memory-card data, but as it only does this when a change is made to the media content rather than whenever the player is powered up, we reckon it's something users will learn to live with and i a small price to pay for the end benefit.

The Micro SD slot is recessed to just the right degree: easy to get your cards in and out, highly unlikely to be press by anything accidentally and spit cards out at inopportune moments.

SanDisk Sansa Fuze

Small but plenty of storage

Feature-wise the Fuze comes with an FM radio that lacks RDS but lets you pre-set your 40 favourite stations, and a voice recorder that's coupled to an excellent built-in microphone. You can set the duration of radio recordings to snag your favourite radio shows, which is a handy little feature. Recordings though are stored as WAV files, which seems a touch unnecessary. If you plan on recording anything of length make sure you have space in the internal memory as a ten-minute recording is going to take up about 55MB.

The user interface is a more-than-decent bit of design with very few flaws. The scrollwheel allows you the move through the straightforward menu structure without lag or delay, while basic navigation is aided by the presence of the 'home' button. Hit this key at any time and you're taken straight to the main menu. Hit it while you're looking at the main menu and it takes you to the Now Playing page. This is not exactly rocket science, but it isn't half useful.

When checking out the music menu, we were relieved to find that clicking on Artist took us to the list of each artist's albums rather than directly to the list of all his or her songs. Chalk one up for common sense!

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.