Feeds
85%
Motorola Defy

Motorola Defy Android smartphone

Hardy handset for the rough and tumble

  • alert
  • submit to reddit

3 Big data security analytics techniques

Hard case

A two metre drop onto a lino kitchen floor was also shrugged off. That said, I have read that a 1m drop onto concrete caused a screen to crack. As with all rugged devices, the exact angle of impact will always have a part to play in its survival.

Motorola Defy

The back panel has to be levered into place to lock it down to seal it

The Defy's semi-tough credentials are advertised by seven small Torx screws that appear to help keep the two halves of the handset together. These may be as much for show as anything else – and I can see them gathering crud over time – but it's still a good looking and solid device. 
 As you can see from the images, the front is almost all screen apart from the four capacitive Android buttons below it. The textured, rubberised sides and back mean even sweaty palms and greasy fingers keep a firm grip, while also providing some extra impact absorption.

The version of Android in play here is the less than fresh v2.1 (Éclair) but Motorola says it has plans to upgrade the Defy to 2.2 in the admittedly slightly vague sounding "Q2". You can get that from the horse's mouth here. The disappointment of having to make do with 2.1 is lessened slightly by Motorola installing Flash Lite 3 but you still can't watch BBC's iPlayer or other video content in a web browser. A YouTube app is preloaded though, so you’re not all out of the latest moving pictures.

Motorola Defy Motorola Defy

Motoblur accounts options and the Launcher Pro alternative

Pasted on top of Android you get Motorola's Motoblur social aggregation front end. I'm not a fan of having my phone book, Facebook and Twitter accounts tied together into a social Gordian Knot and I found the interface rather stodgy. Instead, I swapped it out for Launcher Pro, which is simpler, faster, more flexible and free. However, if you are a compulsive networker, Motoblur does a good if slow job of linking up your contacts and feeds.

SANS - Survey on application security programs

Next page: Character building

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.