Feeds
90%
Sony Walkman W202

Sony W-series Walkman MP3 player

Eat this, Shuffle

  • alert
  • submit to reddit

High performance access to file storage

Review Apple's recent re-design of its iPod Shuffle wasn't exactly greeted with universal enthusiasm. Now Sony has come at the idea of a screenless music player from a wholly different direction and decided to build the player directly into the earphones – or vice versa, depending on how you look at things. Sounds clever, but does it work?

Sony Walkman W202

Sony's Walkman W202: the two halves connect magnetically

As you can see from the pictures, the W202's trick feature is the way its two halves fit together to keep things neat and tidy when not in use. The two sections don't actually clip together but rather use a magnet to stay joined - cute. To prevent them coming adrift in your pocket or bag – thus potentially switching the player on and draining the battery – Sony supplies a plastic clip that the two joined parts slot into. The clip also apparently prevents the magnet from zapping any nearby credit cards.

We aren't exactly convinced of the science behind this idea that plastic can shield things from magnetism but we weren't about to risk our Visa card in the quest for empirical proof.

Sony also provides a deskstand with a USB cable that the W202 can be slotted onto to keep it out of harm's way while connected to a PC. Thankfully, the connection between the player and the dock is a standard mini USB port so you can also use a regular cable when travelling.

Sony Walkman W202

The player in the 'phones - or the 'phones in the player?

Controls are kept to a minimum. Built into the right-hand earpiece is a volume rocker and a jog wheel that doubles up as a power switch and play/pause/skip control. To turn the player on, simply separate the two halves and push the jog wheel in. To switch it off, join the two earpieces back together again.

High performance access to file storage

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.