Feeds
70%
Samsung Emporio Armani Night Effect

Samsung Emporio Armani Night Effect designer phone

Sophisticated - or silly?

  • alert
  • submit to reddit

High performance access to file storage

Review After some flash for your cash? Hot on the well-turned heels of LG's new Prada phone, Samsung and Armani have delivered their latest ensemble - the Emporio Armani Samsung Night Effect.

Samsung Emporio Armani Night Effect

Samsung's Emporio Armani Night Effect: sophisticated?

Rather than reworking last year’s elegant Giorgio Armani Samsung touchscreen collaboration, this model takes a distinctly different approach to design. Tall, thin and smooth, with brashly lit edging, this otherwise sophisticated-looking candybar phone is designed for younger fashion-savvy buyers.

The branding certainly isn’t subtle. As well as logos on the front and back, a stand-out Emporio Armani neon strip lights up the side of the phone - part of the glowing blue, red or green LED trim that appears around the edges when the phone’s in action. No one’ll miss what phone you’re packing, that’s for sure.

While the design is eye-catching, the features roster is more solid Samsung mid-tier than trend-setter. It’s a 3.6Mb/s HSDPA 3G handset sans Wi-Fi but with a typical tick-list of music and movie download and playback facilities, plus a set of dedicated music player control buttons and a 3.5mm headphone socket on the side. A 3.2Mp camera with autofocus - but no flash - is built into the back, and there’s a front-facing face-to-face video chat camera.

Naturally, you get plush Emporio Armani-branded accessories: a CD-style fabric zip-up carry case, neckstrap and earphones.

Samsung Emporio Armani Night Effect

Glows blue...

Apart from the dazzling light effects and overt branding, the phone’s design is relatively restrained. Available in minimalist black or white bodywork, the candybar’s numberpad is totally smooth, finished with a fine hairline-metal effect. Rubber-feel material is used on the back, giving it a decent grip in the hand, while reinforced glass protects the display. Measuring 114.9 x 47.4 x 12mm and weighing 90.2g, it’s well balanced to operate one-handed.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.