Feeds
75%

Sony Ericsson Cyber-shot C902 cameraphone

Happy snapping

Security for virtualized datacentres

Review It's clear that the design of Sony Ericsson's C902 is far more conventional than the likes of the K810 or K850. Gone is the 'small key' design, the keypad now being a sort of cross between that of a W960 and a K800.

The new look works without any major drama, but hardly pushes back the boundary of design and we certainly prefer the 850/810 keyboard style for texting. Still, it's a smart looking lump, measuring 108 x 49 x 10.5mm and weighing in at 118g. It's a little lighter and substantially thinner than the either the K850 or the K810.

Sony Ericsson C902 Cyber-shot camera phone

Sony Ericsson's Cyber-shot C902: smart looking

Did we say 108mm tall? Well, sometimes. To activate the camera on the C902 you need to take a firm hold on the top and pull open the 8mm slot that covers the lens. Luckily, the slider feels well engineered and likely to hold up to repeated use without starting to slide shut under its own weight or wobble as time and repeated use takes its toll on the mounting.

Technically, the C902 is very close to the K850i. What you get for your money is – deep breath – 160MB of on-board memory and a Memory Stick Micro expansion slot; quad-band GSM/GPRS/Edge and 3.6Mb/s HSDPA; a 2in, 240 x 320 screen with ; an accelerometer-driven auto-rotate system; an FM radio with RDS; TrackID song recognition; Bluetooth with A2DP wireless stereo; a five-megapixel autofocus camera with 30f/s QVGA video recording; the Video, Photo and MusicDJ applications that are now common on most mid-range and above Sony Ericsson handsets; an RSS hub; voice recorder; picture blogging application; three games and support for MP3, AAC and MPEG 4 media. You also get Google Maps pre-loaded and the PlayNow music ringtone purchase web application.

One glaring difference between the C902 and the K850 is the removal of support for Micro SDHC cards. At a recent Sony Ericsson press event, we tried to get to the reasoning behind this, especially as it looks as though the new Cyber-shot C905 handset will also only come with M2 expansion. The best answer we got was that at the the time of the K850i's release, M2 cards only went up to 4GB, so building in support for 8GB Micro SDHC was the obvious move.

New hybrid storage solutions

More from The Register

next story
Apple iPhone 6: Missing sapphire glass screen FAIL explained
They just cannae do it in time, says analyst
Oh noes, fanbois! iPhone 6 Plus shipments 'DELAYED' in the UK
Is EMBIGGENED Apple mobile REALLY that popular?
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Half a BILLION in the making: Bungie's Destiny reviewed
It feels very familiar - but it's still good
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
DARPA-backed jetpack prototype built to make soldiers run faster
4 Minute Mile project hatched to speed up tired troops
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.