Feeds
80%
Acer Tempo M900

Acer Tempo M900

Acer's last and best Windows Smartphone?

  • alert
  • submit to reddit

High performance access to file storage

The card slot is said to be good for 8GB and that was the largest capacity card we had on hand to test it with. There’s also a three-way jog wheel which is a handy addition to the control portfolio, as the M900's touch screen could do with being just a little more reactive.

Acer Tempo M900

The fingerprint reader also functions as a navigation pad

The bottom of the fascia is home to five buttons, two to start and end calls, one to fire up the GPS system and Google Maps. Another takes you back to whichever of the three Acer Shell home pages you were last looking at. Unlike those featured on the F900, the four fascia buttons physically move when you press them, making the M900 a rather more satisfying handset to use.

The curious little central button between the GPS and Home buttons is actually a combined finger print scanner and navigation pad. In the latter function, it proved a bit hit and miss, being rather too small and too far recessed to allow for reliable or accurate use but at least you can disable it via the settings menu.

The finger print scanner worked exactly as advertised and accepted our four set-up swipes at only the second time of trying. We had no problems with reliability either, the scanner always accepting our print swipe on either the first or second attempt. If the scanner does throw a wobbly you can simply type in your four digit PIN number to unlock the handset.

Unlike the HTC Pro2 or the Nokia N97, the M900 is a simple slider with no fancy screen angle articulation. The keyboard itself has 41 individual keys and is laid out in a slight bow from left to right. We found the keys to be nicely sized and weighted, making rapid and fault-free typing a cinch.

Acer Tempo M900

Well-spaced keys allow for more accurate typing

We also liked the soft yellow glow that illuminated all the function keys. These include the numeric keys, the M900 keyboard being laid out in four rows as per the HTC TyTN II, rather than having a separate row of buttons for 0-9 up top as found on the Touch Pro and Pro2.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.