Feeds
85%

Nokia N79 smartphone

Change for change's sake?

  • alert
  • submit to reddit

High performance access to file storage

Review We reviewed Nokia's N78 back in the summer of 2008 and even in the quick turnover world of mobile phones it almost seems a little too soon to be looking at its successor. But here it is, looking leaner, fitter and offering some significant improvements – it's almost as if Nokia just couldn't wait to get it out there.

Nokia N79

Nokia's N79: the N78, tweaked a bit

To start with the more obvious stuff, it's slightly shorter and lighter than its predecessor at 110 x 49 x 15mm and 97g - as opposed to the N78's 113 x 49 x 15mm and 102g. Estimated battery life is longer too, at 5.5 hours' talk time and 372 hours on standby - 3.2 and 320 hours, respectively, for the N78.

The trade-off is with internal memory. The N79 has 50MB, 20MB less than the N78, but it comes with a 4GB Micro SD card, though it can only handle a maximum of 8GB, which is a pity in these 16GB days. The camera now boasts five million pixels instead of three and there are two LED photo lights instead of one.

Memory aside, the N79 yields no other concessions to its predecessor and it's very well connected, with quad-band GSM, plus HSDPA 3G (3.6Mb/s), Wi-Fi, stereo-capable Bluetooth and A-GPS.

Nokia has chosen this handset to mark a return to the 'alternative covers' concept that was all the rage at the turn of the century – don't change your phone, just change the colour of the case. There are five different rear panels available in classily restrained shades of brown, green, blue, white and red, three of which are included with each phone. They're not just ordinary covers either, but "smart" XpressOn covers – they have a chip in them so that the phone's themes will automatically change to whichever colour cover you use.

Nokia N79

Change the colour of back cover and the screen alters too

The styling element, along with N-Gage games and photo-sharing options, give the impression that the N79 is intended to be the teen of the N series, though the price would seem to count against that. Or are teenagers getting older these days?

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.