Feeds
65%

HTC Touch Viva budget Windows Mobile smartphone

Wrong features left out?

High performance access to file storage

Review Of all the many and varied iPhone challengers out there, HTC's Touch series has probably come closest to the Apple handset in terms of versatility and ease of use.

The Taiwanese manufacturer's been churning out variations on the theme with dizzying regularity, in sharp contrast to Apple's one-size-fits-all policy, with small, pocket-friendly Touches, big-screen Touches and chunky Qwerty-keyboard Touches. And now it's added a stripped-down, no-frills version as the least-cost entry into Touch World.

HTC Touch Viva

HTC's Touch Viva: pared back

The trouble with cut-price, cut-down versions of existing handsets is, of course, what to leave out. Which features play to the core design's strengths and should be retained, and which will no one miss?

Here's there's no 3G, no GPS and no 3.5mm headphone jack, though there is that rather lovely touchscreen, HTC's TouchFlo interface, Wi-Fi connectivity and a 2Mp camera. Our recently acquired, fashion-led eco-conscience was also pleased to see that the phone’s manual is provided on disc rather than paper, which reduces the clutter in an already frill-free box.

At first glance, the Viva looks very similar to the original Touch, launched a lifetime ago... well, June 2007. There have been a few improvements since then. There's now a minimum of buttons: a square navpad and call start/stop keys on the front, a power button on top, and an elongated volume rocker on the side. Along with a USB power/headphone combo-socket on the bottom, that's it, all other controls are presented on the touchscreen.

HTC Touch Viva

The screen's recessed into the casing

Speaking of which, it's a good-sized, 2.8in, 240 x 320 version. There are bigger, higher resolution screens out there, but it looks clear and sharp, even with video. There seems to have been an odd decision taken with regard to the placement of the screen, however. It's recessed a couple of millimetres into the phone's casing, which may help to protect it if the phone's laid face down, but makes it a nuisance to use.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.