Feeds
70%

Samsung Tocco SGH-F480 touchscreen phone

Who calls a phone Tocco, I mean really

5 things you didn’t know about cloud backup

Samsung doesn't mention a macro mode, but the camera’s autofocus system automatically handles close up shots with no fuss, and results from 10cm or so away are sharp and detailed. A 4x digital zoom is controlled by the volume rocker, which sits on the bottom of the phone in camera mode. Adjustments can be made for white balance, ISO, exposure metering and so on, plus the usual flash control, multi-shot options and shooting effects. You can also tap to view the image album, in landscape or portrait, which can be browsed by finger-swiping. Again, not nearly as smooth an experience as the iPhone, but OK.

You can edit images with the basic on-board photo editing software, or send them directly to blogs or accounts on image-sharing websites, using an embedded ShoZu application

Samsung Tocco SGH-F480 touchscreen phone

Samsung also includes a slide-on back plate with a rigid leather-look cover

Similarly, you can edit and upload video clips taken with the Tocco. Movie quality doesn’t match the stills performance, the maximum 320 x 240 pixel setting - shooting at 15 frames per second - is average quality mobile video footage that won’t impress when viewed off the phone. Downloaded or PC-sent video clips are smoother, however.

Samsung’s music player interface has a regular kind of Samsung set-up, with low-key touch-scrollable lists of categories and tracks. Standard player buttons appear on screen, and you can move through tracks by dragging the timeline along. Categories are the regular fare – artists, albums, tracks, composers and podcast – and you can add equaliser-style effects.

Samsung again boasts the inclusion of Bang & Olufsen ICEpower audio technology inside, and thankfully this time supplies a better than average set of in-ear earphones in the box. These in-ear buds produce some bass depth and a decent top end, so you can get some fine listening as soon as you load tunes. You can also upgrade your ear-gear: the headset in a two-part affair that has a standard 3.5mm jack socket for plugging in your own high quality headphones.

It’s a shame that Samsung has stuck the bit that connects to the phone – a standard proprietary headphone/charger/USB connector – on the side rather than on top or bottom, making it awkward and snag-prone when it's in your pocket.

The essential guide to IT transformation

Next page: Verdict

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.