Feeds

iPhoney nano found, tested in Asia

Not the gadget you were expecting...

3 Big data security analytics techniques

Review While rumours of an iPhone Nano abound, anyone knocking about China or South-East Asia with a few quid spare can buy one right now. Well, up to a point. While the 'iPhone Mini' looks and feels like a Nano-style two-thirds scale iPhone -and even comes complete with an almost-Mac icon on the back - it has absolutely sod-all to do do with the folk at Cupertino.

iPhone Mini

iPhoney and friend

The Mini - “Designed by USA. Assembled in China,” according to the case - measures up at 90 x 52 x 11mm, weighs around 70g and has a 2.5in screen of indeterminate resolution. Register Hardware's immediate impressions were that in all, it's an eminently pocketable little device and certainly feels as well made as a genuine iPhone.

iPhone Mini

The 'iPhone' Mini: looks the part

According to the back panel, the Mini comes with 8GB of storage but we couldn't find any way of accessing it - only the supplied 1GB SD card showing up in File Explorer, so perhaps that 8GB symbol means it supports SD cards up to 8GB. Or maybe you shouldn't take that '8GB' any more seriously than the faux Apple logo.

iPhone Mini

There's the lock slider...

Switch the Mini on and the usual Apple icon flashes up followed by the trademark virtual lock slider. The main menu page is also pretty much as per the iPhone, only the status bar at the top suggesting that all is not quite kosher.

When it comes to general system navigation, the Mini, while not iPhone fluid, is really no less pleasant or easy to use than the touchscreen UI on an HTC Touch or similar device. The Mini also comes with haptic feedback for those who need that extra confirmation that they've made contact.

iPhone Mini

Hang on, though - that logo's not quite right...

The Mini's touchscreen in resistive rather than capacitive, a choice no doubt partly dictated by cost and partly by the need to use a stylus to type on the diminutive virtual Qwerty keyboard which only appears in portrait mode. That's not to say you actually have to use the stylus – after some practice we managed to finger-type with around a 60 per cent chance of getting the right letter the first time.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.