Feeds
90%

Samsung Innov8 i8510 eight-megapixel cameraphone

Samsung's best smartphone yet

Top 5 reasons to deploy VMware with Tegile

For instance, as well as a full web browser, you can upload images to websites and blogs using the Shozu application. There’s a suite of Google apps - Search, Mail and Google Maps - plus Fring's VoIP and IM application. Gypsii hits the spot for location-based social networking, while the phone boasts support for DivX video. Samsung is clearly aiming at a wide target audience with its do-everything approach.

Any Nokia smartphone stalwarts thinking about switching rides will feel comfortable with the i8510’s handling. It’s a large phone, but not excessively so for the functionality it packs. It measures 106.5 x 53.9 x 17.2 and weighs 136g, which is fractionally larger but thinner than the N95 8GB. It has a high quality, solid build with nicely rounded edges, so slips into the pocket just fine.

Samsung i8510 8-megapixel cameraphone

The Shortcuts option can be tailored to how you want functions to appear

The spring-loaded slider is firm and smooth, while the numberpad has a nicely responsive key action. A couple of keys flanking the Clear button provide user-definable function shortcuts, but the main action revolves around the navpad and S60 menu system.

That said, the home screen has a distinctly different look and feel to Nokia’s S60 smartphones. A column of icons ranges down the left of the screen, linking to Shortcuts, Calendar, Music player, FM radio and Personalisation sections. As you click through these, more detailed sub-menus appear, which you can scroll through and click to select.

The navpad's centre button doubles up a touch-sensitive mini trackpad, providing a whizzier way of sliding through menus and jinking around webpages in the browser.

In day-to-day menu-surfing mode, though, it’s one of those touch-operated controls that you'll either love or hate. We found it could too easily be accidentally brushed against or mis-clicked, taking us to menu places we didn’t want to be. Thankfully, it can be easily deactivated, or its sensitivity adjusted.

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD to DIE, and this is WHY
Apple, er, couldn’t get the parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.