Feeds
65%
Samsung Diva

Samsung Diva fashion phone

Here come the girls, etc, etc.

  • alert
  • submit to reddit

High performance access to file storage

Reviews The design and marketing of the Diva clearly makes this a phone that Samsung is aiming at women. The clues are in the pearl white colour scheme and quilted pillow effect casing and the default pink screen theme, just in case you missed all those ads - haven't there been a lot of them lately?

Samsung Diva

Samsung's Diva: diamond head

Perhaps the designers are all Footballers' Wives fans, but I can imagine this being a Marmite handset: some will love it, but others...

Incidentally, the S7070 is the fancier of the two Diva models – there's also a clamshell version, the S5150, with a similar style and spec which hasn't had an official UK release, though you can find it for sale online.

The Diva has a smartphone-style touchscreen atop a jewel-shaped button that looks like it may be a navpad but actually works as a back key. It's slim and lightweight, while the thin plastic back's padding-effect texture that feels nicely grippy in the hand. There's a strange hollow ring to it though which can be a bit disconcerting if you occasionally tap it while holding the phone to your ear. Call sound quality tends to be a bit on the tinny side too.

The 2.8in, 240 x 320 capacitive touchscreen runs to more than 16 million colours and looks good. It's sharp and clear, and decently sensitive too, responding well to brushes and presses, and offering the option of haptic feedback.

Samsung Diva

Quilty conscience

The Diva has Samsung's TouchWiz user interface, which was always something of a looker, with its myriad widgets that you can pull on to the home screen from a side bar. There are three homepages that you get to by brushing in either direction, and if pink's not your thing, there are other screen themes to choose from – most of them floral, however.

High performance access to file storage

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.