Feeds
75%

Samsung Omnia 16GB smartphone

As good a phone as it is a media player

High performance access to file storage

The supplied earphones are rather odd affairs that come with plastic trumpet-looking extensions that sort of rest in your ear. They sound good but we kept expecting them to fall out - which the one on the shorter cable did, regularly.

As the Omnia doesn't come with a dedicated headphones socket, this could have spelled disaster, but luckily the earphones rig is a two-piece affair, the bottom half consisting of the hands-free device with the Samsung jack at one end and a 3.5mm socket at the other, so you can use whatever 'phones you want to and still keep full hands-free functionality.

Samsung SGH i900 Omnia 16GB

The 'desktop' can quickly become a mess... unlike the main menu

It's a shame the Samsung jack sticks out of the side of the handset in such a blatant manner, though. It's built to snag and gets in the way if you are holding the handset to watch video in landscape. As is always the case, a 3.5mm jack in the top or bottom of the handset would have been a better option.

The 2592 х 1944 pixel snapper comes with autofocus and image stabilisation, making it by far the best camera we have come across on a Windows Mobile handset. The LED “flash” makes it useless for nighttime or low-light photography, but in daylight the results are highly laudable, images being crisp and colourful if not quite as rich those taken with a Sony Ericsson K850i, which we used for comparison. Time between pictures isn't bad either, we managed a snap every four or so seconds.

Video footage can be recorded at either 640 x 280 at 15f/s or 320 x 240 at 30f/s. With top- end Nokias recording moving images at 640 x 480 and 30f/s, this isn't anything to shout about.

Signal reception on our test handset, both Wi-Fi and cellular, was rather poor. On a number of occasions the Omnia struggled to find a signal in places were other handheld devices managed to do so with ease. Had this just been an issue with cellular connectivity we may have put it down to the vagaries of the Orange network - which supplied our locked test handset - but the same was true of the W-Fi radio. In a location where our an HTC Touch Pro picked up a Wi-Fi signal with ease, the Omnia wouldn't even register the signal's presence.

High performance access to file storage

Next page: Verdict

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.