Feeds
75%
HTC Snap

HTC Snap

Paint it BlackBerry

  • alert
  • submit to reddit

High performance access to file storage

On either side are call start and stop buttons, home and back keys plus two soft keys for the Contacts list and the Windows menu. The four-line keyboard is nicely done, and though there are no spaces between the keys in each line, the rounded shape of the buttons makes them easy to distinguish under the thumb. We found it just as easy to use with one or two hands.

HTC Snap

A good, messaging-friendly keyboard

We'd have liked to be able to get symbols by holding down the appropriate key, which is how our Nokia E71 works. Instead, you'll have to use the FN button, requiring two presses to put a number into a text message. Shame.

There are shortcut keys for messaging and Windows Messenger, as well as Inner Circle, a utility that prioritises emails from your most important contacts. You can add anyone to your Inner Circle list, and when you press the dedicated key on the keyboard, emails from anyone on that list come to the fore. Unfortunately, there's only one Inner Circle, so your most important family members will be bundled in with your most important work colleagues, but it's still useful if you've got a bulging inbox full of trivia.

HTC Snap

HTC has improved on the Windows UI...

The Windows Mobile 6.1 Standard edition user interface hasn't had the same extensive overhaul treatment as HTC's touch screen devices such as the Touch Pro 2. There's a basic HTC menu which allows you to flick between the main apps such as messaging, calendar, settings, video, music player, web browser, weather etc, but the Windows menu brings up the OS' standard clunky layout. If HTC plans more Windows Mobile Standard devices, we'd like to see the interface brought up to the standard of their touchscreen brethren.

HTC Snap

...but it's as big an overhaul as the Touch phones' UI is

POP3 email accounts were easy to set up and you can arrange for your inbox to be checked automatically at five minute intervals or less.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.