Feeds
70%

Sony Ericsson Walkman W760i 3G sliderphone

Positively packed with features: some pointless, some practical

3 Big data security analytics techniques

Frankly, Shake is very gimmicky, and is unlikely to impress anyone above voting age. It’s far simpler and more precise to use the music buttons, and you don’t run the risk of launching your phone across the room when you change tracks.

The rest of the Walkman experience is pretty impressive, though. Using the latest Walkman user interface, it’s again an intuitive, easy-to-use music player. Track classifications include artists, albums, tracks, playlists, year and genre, plus podcasts and audio books. Sony Ericsson’s SensMe option can compile a playlist automatically from your choice of mood and tempo, selected graphically. However, it only uses tracks suitably rated with Sony Ericsson’s supplied Media Manager software.

Sony Ericsson W760i Walkman 3G slider phone

Available in black or silver, the plastic casing feels fairly sturdy

Although again veering towards the gimmicky, you could at least see this being useful for workouts, or for runners using the W760i’s Tracker software. The audio performance is high quality too. The supplied two-piece earphone set is much better than average for a mobile, and gives a pleasant sound delivery, with proper amounts of bass and lots of detail.

Although the W760i uses a typical awkwardly bulky side-mounted headphone/charger/USB connector, it’s easy to add your own better quality headphones, thanks to the standard 3.5mm headphone socket included on the phone side of the two-piece boxed headset. Stereo Bluetooth wirefree headphones are supported too.

The loudspeaker on the W760i can be cranked up loud – it needs to be for its satnav duties – but doesn’t produce quality sound output for music: it's bass-light and harsh when at high volume.

The W760i has 40MB of on-board user storage, but comes supplied with a 1GB Memory Stick Micro memory card - there’s an easy-access handy slot on the top for popping it in. Copying tracks over from a PC involves either using Media Manager or drag-and-dropping tracks, or Bluetoothing files across.

Other usual music features are present too, including a decent quality FM radio with RDS, TrackID song identification software, and the Walkman-staple Music Mate application.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.