Feeds
80%
Acer Tempo M900

Acer Tempo M900

Acer's last and best Windows Smartphone?

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The card slot is said to be good for 8GB and that was the largest capacity card we had on hand to test it with. There’s also a three-way jog wheel which is a handy addition to the control portfolio, as the M900's touch screen could do with being just a little more reactive.

Acer Tempo M900

The fingerprint reader also functions as a navigation pad

The bottom of the fascia is home to five buttons, two to start and end calls, one to fire up the GPS system and Google Maps. Another takes you back to whichever of the three Acer Shell home pages you were last looking at. Unlike those featured on the F900, the four fascia buttons physically move when you press them, making the M900 a rather more satisfying handset to use.

The curious little central button between the GPS and Home buttons is actually a combined finger print scanner and navigation pad. In the latter function, it proved a bit hit and miss, being rather too small and too far recessed to allow for reliable or accurate use but at least you can disable it via the settings menu.

The finger print scanner worked exactly as advertised and accepted our four set-up swipes at only the second time of trying. We had no problems with reliability either, the scanner always accepting our print swipe on either the first or second attempt. If the scanner does throw a wobbly you can simply type in your four digit PIN number to unlock the handset.

Unlike the HTC Pro2 or the Nokia N97, the M900 is a simple slider with no fancy screen angle articulation. The keyboard itself has 41 individual keys and is laid out in a slight bow from left to right. We found the keys to be nicely sized and weighted, making rapid and fault-free typing a cinch.

Acer Tempo M900

Well-spaced keys allow for more accurate typing

We also liked the soft yellow glow that illuminated all the function keys. These include the numeric keys, the M900 keyboard being laid out in four rows as per the HTC TyTN II, rather than having a separate row of buttons for 0-9 up top as found on the Touch Pro and Pro2.

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.