Feeds
80%
Acer Tempo M900

Acer Tempo M900

Acer's last and best Windows Smartphone?

  • alert
  • submit to reddit

High performance access to file storage

Review With the launch of the M900, Acer's assault on the smartphone market comes to a halt. Well, at least until its first Android or WinMo 6.5 handsets emerge blinking into the cold light of day. Joining the ranks of the dual SIM DX900, 2.8in screen X960 and 3.8in F900, we now have a Windows Mobile handset with a slide-out Qwerty keyboard.

Acer Tempo M900

Acer's Tempo M900

Unlike the F900, the M900 doesn't face direct competition from HTC, the doyen of Windows smartphones, since the HTC Touch Pro2 makes do with a 3.6in screen. Acer, however, has fitted the M900 with the same bright and colourful resistive 3.8in screen fitted to the F900.

Despite the extra screen size, Acer has done a good job of keeping the M900's size and weight in line with the HTC device. At 188g, it’s a only half a gram heavier than the Pro2 while at 119 x 62 x 17.1mm it’s a negligible 3mm wider and taller and fractionally thinner.

Of course, the Touch Pro2 is a big old lump of a phone in its own right and some potential purchasers may rule out both devices simply on the grounds of them being far too big and lardy for convenient day-to-day use. Stick either in an inside suit jacket pocket and it looks like your mother dressed you, so it’s just as well Acer bundles a rather fine leather belt clip.

If you are concerned about such matters, we reckon that the M900 is a more handsome device than its sibling. The edges of the fascia are nicely curved while the smoked chrome strip running around the handset makes it look just a bit more grown-up and thoughtful than the F900.

Acer Tempo M900

With a 3.8in screen and a Qwerty keyboard, bulk is inevitable

You won't find much out of the WinMo smartphone ordinary with the M900. One the right hand side are buttons to turn the device on and off, the camera switch, a button to fire up the voice control system and the slot for the telescopic stylus. On the opposite side there’s a miniUSB port and MicroSD card cover.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.