Feeds
70%
Doro 338gsm

Doro PhoneEasy 338gsm

Fuss-free phone with dedicated panic button

  • alert
  • submit to reddit

5 things you didn’t know about cloud backup

Review Doro is a Swedish company which launched its first range of back-to-basics mobile phones in 2007, aimed at the elderly and people with limited dexterity. Using a Doro phone is like taking a step back in time. A time before smart phones, mobile internet or even camphones – this is an extremely basic handset.

Doro PhoneEasy 338gsm

Doro's PhoneEasy 338gsm: simplicity is key

It would be easy to chuckle at the Doro's simplicity, its almost naïve presumption in relying on basic virtues of good call quality and ease of use. Even though the 338gsm is bottom of the new Doro PhoneEasy series, it isn't a quickly churned out cheapie from the dog end of a company's range. It's actually a very carefully considered, finely nuanced tri-band phone that shouts quality, even as it whispers simplicity.

It costs £100 SIM-free but it certainly doesn't feel cheap, dressed in a solid, highly tactile rubberised plastic that's sort of warm and comforting. At 16mm and 95g it’s both slim and light, although there's no danger of losing it, since it casts a sizeable shadow at 125 x 52mm. The sides house the volume buttons, menu button, charger input, 2.5mm headphone socket and the power button. Around the back is a panic button – more on that later.

Much of this phone's size is due to the keypad. Compared to some of the diminutive examples from the likes of Sony Ericsson recently, it's absolutely huge. The large rectangular number buttons sit a little proud of the casing, so they're easy to find with the thumb and they offer click feedback when they're pressed – it's exceptionally easy to use and that's clearly no accident.

The call start and stop buttons are even bigger and they're on either side of a pair of arrow buttons for scrolling through menus – rather like the sort of thing you used to get on ancient Nokias.

Doro PhoneEasy 338gsm

In touch: the Doro's large buttons receive RNIB approval

Above them is a dedicated button for the address book, which will hold up to 50 names, and three large speed dial buttons for key contacts, clearly labelled A, B and C. You type a number, then press and hold one of the three memory buttons to save it – did we mention it was easy to use?

The essential guide to IT transformation

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
Chumps stump up $1 MEELLLION for watch that doesn't exist
By the way, I have a really nice bridge you might like...
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.