Feeds
75%
Palm Pré

Palm Pre smartphone

The next best thing to an iPhone?

  • alert
  • submit to reddit

High performance access to file storage

And, while we wish we could say something good, or at least interesting, about the 3Mp camera, the fact is our test images were variously underexposed, handled high contrast scenes badly and produced lots of JPEG artefacts. It’s a standard mobile phone camera with no video recording.

Palm Pré

Images look good on-screen, but the ones taken with the camera are none too special

The media player is better than most and easy to use and thankfully the headphones connect with 3.5mm jack and do the job. The call quality was absolutely fine and reception was too, with no dropped call issues or ropey Internet connections, but maybe living in London helps.

Battery life was about as good as the iPhone, but nowhere near the bar set by Blackberry's finest. With it set to receive push email, calendar, contacts from Gmail, along with regular Google Maps and YouTube usage on the bus, it managed around a day and a half. Not bad really.

So you're after a smartphone, you've got money to burn and an obvious decision to make: this or the iPhone. No other touchscreen smartphone is even in the running. The Pre has some obvious advantages. It's a bit smaller than the iPhone and 'Synergy' works well, which could prove useful if you're more familiar with Facebook than the concept of Gmail or an Exchange server. But weigh it against the iPhone and it's hard to recommend.

The keyboard is horrible and the rest of the hardware design, while initially desirable, just isn't up to snuff. The screen is smaller than the iPhone's and things like web browsing or watching YouTube videos are less enjoyable.

Palm Pré

And you can make calls on it too

We’re hopeful, of course. WebOS is a work of genius that should appear on as many phones as possible, as soon as possible. It’s responsive, extremely fast and offers a huge number of productivity tools. Having your Facebook contacts rolled into your everyday contacts list is incredibly useful. The ability to multitask is brilliantly implemented and genuinely useful, besides providing a valuable point of difference over Apple iPhone.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.