Feeds
80%
Acer Tempo M900

Acer Tempo M900

Acer's last and best Windows Smartphone?

  • alert
  • submit to reddit

Intelligent flash storage arrays

The card slot is said to be good for 8GB and that was the largest capacity card we had on hand to test it with. There’s also a three-way jog wheel which is a handy addition to the control portfolio, as the M900's touch screen could do with being just a little more reactive.

Acer Tempo M900

The fingerprint reader also functions as a navigation pad

The bottom of the fascia is home to five buttons, two to start and end calls, one to fire up the GPS system and Google Maps. Another takes you back to whichever of the three Acer Shell home pages you were last looking at. Unlike those featured on the F900, the four fascia buttons physically move when you press them, making the M900 a rather more satisfying handset to use.

The curious little central button between the GPS and Home buttons is actually a combined finger print scanner and navigation pad. In the latter function, it proved a bit hit and miss, being rather too small and too far recessed to allow for reliable or accurate use but at least you can disable it via the settings menu.

The finger print scanner worked exactly as advertised and accepted our four set-up swipes at only the second time of trying. We had no problems with reliability either, the scanner always accepting our print swipe on either the first or second attempt. If the scanner does throw a wobbly you can simply type in your four digit PIN number to unlock the handset.

Unlike the HTC Pro2 or the Nokia N97, the M900 is a simple slider with no fancy screen angle articulation. The keyboard itself has 41 individual keys and is laid out in a slight bow from left to right. We found the keys to be nicely sized and weighted, making rapid and fault-free typing a cinch.

Acer Tempo M900

Well-spaced keys allow for more accurate typing

We also liked the soft yellow glow that illuminated all the function keys. These include the numeric keys, the M900 keyboard being laid out in four rows as per the HTC TyTN II, rather than having a separate row of buttons for 0-9 up top as found on the Touch Pro and Pro2.

Beginner's guide to SSL certificates

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Microsoft fitness bands slapped on wrists: All YOUR HEALTH DATA are BELONG TO US
Wearable will deliver 'actionable insights for healthier living'
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
Amazon hopes FIRE STICK will light up its video service
We do streaming video? It seems we do...
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.