Feeds
85%
Apple iPod Touch 4G

Apple iPod Touch 4G

iPhone lite

  • alert
  • submit to reddit

Build a business case: developing custom apps

Review The rumour mill was flying thick and fast last year with speculation that the new third-generation version of the iPod Touch would include a camera for the first time. However, the model unveiled featured a faster processor but no camera, leaving the Apple faithful feeling somewhat underwhelmed.

Apple iPod Touch 4G

Apple's iPod Touch: includes a front facing camera for FaceTime chat

However, Apple did at least cut the price of the 3rd generation model and Steve Jobs stated that Apple’s main priority with that model had been to keep the price down in order to exploit the iPod Touch’s new-found status as a hot gaming gadget.

This year’s update is a more ambitious affair, though, as the new 4th generation iPod Touch includes a camera as well as a number of other important new features. In fact, about the only things that haven’t changed are Apple’s little white earphones and the par-for-the course iPod audio quality.

The first thing you notice is that the new model is slimmer than its predecessor, measuring a mere 7.2mm thick. The edges are also more tapered, enhancing the streamlined appearance. Battery life has increased though, with Apple now claiming 40 hours for music playback and seven hours for video – up from 30 hours and six hours for the previous model.

Turn it on and you’ll see that the iPod Touch now sports the same high-resolution Retina display as the iPhone. The increased resolution produces smoother text display than on the previous model, while the improved contrast results in crisper blacks.

Apple iPod Touch 4G

Also offers 720p video recording

But while the screen of the iPod Touch has the same 960 x 640 resolution as that of the iPhone, it lacks the IPS (in-plane switching) of the iPhone screen. As a result, the iPod Touch screen is just a little darker and has a slightly more limited viewing angle than the iPhone. However, that’s probably only going to be a problem for people who try to peer at the screen over your shoulder on the tube.

The essential guide to IT transformation

Next page: Photo Finish

More from The Register

next story
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.