Feeds
75%
Sony Ericsson Walkman W705

Sony Ericsson Walkman W705 music phone

Add GPS and it becomes the W715

  • alert
  • submit to reddit

High performance access to file storage

An above-average set of in-ear earphone buds is supplied with the W705, enabling the Walkman music player to put in a high quality audio performance out of the box, with good tonal balance and plenty of presence at the low end. The phone has an equaliser if you fancy boosting the bass or fiddling with other frequencies.

Sony Ericsson Walkman W705

You can shake the W705 - but it's easier to control with the keys

Once again, Sony Ericsson has used a side-mounted multi-connector socket for the earphones rather than a standard 3.5mm socket. But there's a 3.5mm adaptor on the two-piece headset so you can upgrade the earphones.

With a bundled 4GB Memory Stick Micro card to go with the 120MB of on-board storage, Sony Ericsson has provided a decent amount of storage to kick off with. You can easily swap memory cards – the slot's on the side, under the back panel but not the battery.

For camerawork, the 3.2Mp shooter on the back is a limited device, with no autofocus, just an LED flash. It’s not up to Cyber-shot spec, but the user interface is straightforward and easy to use. The usual cameraphone adjustments can be made – white balance, exposure, image size and so on, plus options for multi-burst and panorama shooting. The phone display auto rotates into landscape mode when the camera’s activated, so you get plenty of viewfinder room.

Rough geo-tagging data can be added automatically to image files, with the W705 using basestation-based triangulation to get approximate geographical fixes on where shots were taken. The W715 uses GPS, of course.

Sony Ericsson Walkman W705

The camera's picture quality is mediocre

You may not bother in any case. Image quality is mediocre, with limited picture detail, though in decent lighting conditions, colours are accurately portrayed. The LED flash has limited effect in dark environments. Video capture is unimpressive too, shooting low quality footage at maximum 320 x 240 resolution at up to 15f/s.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.