Feeds
85%
HTC 7 Pro

HTC 7 Pro WinPho 7 smartphone

Qwerty contender ready for business

  • alert
  • submit to reddit

Business security measures using SSL

Review Any Windows Phone 7 device will give you a virtual Qwerty keyboard on its touch screen, but the HTC 7 Pro is one of the very few to offer a proper, slide-out hard key version, and the Dell Venue Pro’s vertical slider pales in comparison to this one.

HTC 7 Pro

Touch or type: HTC's 7 Pro

It’s not an outsize handset like HTC’s HD 7, but it is chunkier than the norm at 118 x 59 x 16mm and 185g, with a metal casing topped and tailed with rubberised plastic. The 3.6in multi-touch capacitive screen sits above touch sensitive versions of the three WP7 buttons and on the sides are a volume rocker, micro USB power/sync slot, and camera button, with 3.5mm headphone jack and power/sleep button on top.

To get to the keyboard you’ll need to slide the screen to the right, which is a bit stiff, but as it emerges there’s a surprise in store. Just as the keyboard becomes fully exposed, the screen tips smartly upwards, giving you an good viewing angle while you’re typing. It will also balance on its own in this position, if you want to set it down while you watch a video.

HTC has had plenty of experience in delivering a quality keyboard experience, and it shows. The 51 keys (count ’em) spread over five lines are made of nicely tactile rubberised plastic and well spaced for easy access. They’re not all the same size – return and space are larger, which is ideal.

HTC 7 Pro

Responsive, but the varying key sizes require a little more care for some tasks

The four cursor keys are very small indeed, but still perfectly easy to use, though you’ll need to use the tips of your thumbs. The keys have got just the right amount of travel and they’re backlit too with shift controls highlighted in ‘HTC green’. You could argue about some of the key choices – there’s a dedicated smiley key that brings up a large (44) range of emoticons, but you need to hit the shift key to get an @ symbol, for instance – but it’s an excellent experience overall.

New hybrid storage solutions

More from The Register

next story
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Get your Indian Landfill Android One handsets - they're only SIXTY QUID
Cheap and deafening mobes for the subcontinental masses
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
A SCORCHIO fatboy SSD: Samsung SSD850 PRO 3D V-NAND
4Gb/s speeds on a consumer drive, anyone?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.