Feeds
70%

iRiver Spinn media player

Why settle for a touchscreen when you can twiddle a knob too?

  • alert
  • submit to reddit

Build a business case: developing custom apps

Review The iRiver Spinn seems to have been forged in the white heat of a fierce row about the merits of a touchscreen vs traditional controls. But rather than come down on one side of the fence or the other, iRiver seems to have ended the argument with a petulant 'fine, we'll have both then!'

iRiver Spinn

iRiver's Spinn: why have touchscreen or physical controls when you can have both?

Eschewing the sleek curves of the iPod Touch or Cowon S9, iRiver has opted for a rather severe, sharp design, albeit with a circular spindle at one end, the upper half of which is the eponymous "Spinn wheel", which can be rotated to the left or right as well as depressed.

Physically, the Spinn is just a shade smaller than Cowon's S9, measuring up at 99.5 x 51 x 10.7mm and weighing 70g. The whole thing is rendered in metal giving it a cool, modern and solid feel.

Apart from the Spinn wheel, the external controls consist of a lock slider and small 'back' button on the top; volume and power controls on the left; and a proprietary - or common-in-Korea-but-nowhere-else - USB port on the bottom.

Be warned, unless you have long finger nails, opening the USB port cover will send you hunting for a very sharp implement. We took to using a craft knife to open it, not a device – we hope – that most people keep about their person.

iRiver Spinn

The metal casing makes for a solid-feeling PMP

Fire the Spinn up and you're presented with a rather stark home page listing the eight main menu items in text along with the time and battery status. To move from one item to the next, you can either rotate the spindle or the use the touchscreen, though if you chose the latter you have to touch the centre bottom of the screen where the numbers 1-8 mirror the menu names. Swipe the main part of the screen Touch-fashion and nothing happens. To access a menu item or setting, you simply depress the spindle when it's highlighted, or touch the relevant name on the screen.

The essential guide to IT transformation

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
End of buttons? Apple looks to patent animating iPhone sidewalls
Filing suggests handset with display strips
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Tim Cook in Applerexia fears: New MacBook THINNER THAN EVER
'Supply chain sources' give up the goss on new iLappy
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.