Feeds
70%

Samsung Tocco SGH-F480 touchscreen phone

Who calls a phone Tocco, I mean really

High performance access to file storage

The TouchWiz user interface doesn’t match up to the slick iPhone experience, but it is an improvement on Samsung’s previous efforts. The screen feels immediately more responsive as soon as you start playing with it. There’s the usual touchscreen haptic feedback, which gives you just enough vibration (and sound) to let you know buttons have been properly pressed. A ‘hold’ button on top allows you to lock the display to prevent accidental pressings.

The default options, lined up in a bar across the bottom of the display, include Dial, Phonebook and Menu buttons. These change as you navigate through the menu systems and applications.

Samsung Tocco SGH-F480 touchscreen phone

The on-screen options change as you navigate through the menu

In addition, a press of the physical button below the display pulls up five large on-screen buttons: for the music player, messages, internet, calls, and the main menu.

A toolbar can be brought up on the left of the display by tapping a small arrowed tab towards the bottom of the screen. The toolbar slips out to reveal a column of icons, representing features and applications, which you can drag and drop on to the standby screen using your fingertip. This works smoothly, with an intuitive feel to it.

However, the applications available as widgets are limited to a selection of stock features: calendar, photo viewer, music player, FM radio, profiles, games, birthday alerts, date and several clock options. You can drag into or out of the widgets toolbar any of these, plus rather neatly, remove your mobile operator logo if it’s cluttering your screen. A simple tap of the arrowed tab closes the toolbar once you’ve finished your widget-fiddling, and your set-up is saved until you decide to change it again.

There’s no facility to download or add more widget applications to the phone, which is a shame, and once you have a few widgets on the small screen it looks cluttered - but it’s a neat user-friendly touch that’s handy rather than essential. It will be interesting to see if Samsung develops this idea further.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.