Feeds
90%
HTC One X quad-core Android smartphone

HTC One X Android smartphone

Quad-core corker

  • alert
  • submit to reddit

High performance access to file storage

Review HTC messed up in 2011 by releasing too many similar handsets. There was nothing actually wrong with phones likes the Sensation, Sensation XL, Sensation XE or Incredible S but equally none of them had me itching to upgrade my Desire HD ahead of schedule.

HTC One X quad-core Android smartphone

The X factor: HTC's One X

Now HTC is hoping to turn things around by putting its eggs in the One basket. For the penurious it has the One V. For middle income types the One S. But what I have here is the top tomato, the One X. A phone HTC is hoping will be considered the best you can get.

Let’s start with the headline specs. The screen is a 4.7in 720p affair with a pixel count of 312dpi. The CPU is a 1.5GHz penta-core Nvidia Tegra 3 unit with 1GB of Ram. Keeping all that in step is Android 4 Ice Cream Sandwich allied to HTC’s new Sense 4.0.

HTC One X quad-core Android smartphone

Long and slim

The exterior of the One X is a gently curved and understated affair and the back has a pleasant matte surface. The look works for me because it doesn’t try as hard to impress as Sony’s new Xperia devices or the Samsung Galaxy Nexus. Build quality is rock solid too, due to the body being carved from a single chunk of polycarbonate plastic much like the Nokia N9 and Lumia 800, while the screen is good old Corning Gorilla Glass.

Below the screen you will find three capacitive buttons – back, home and recent apps – rather than the four of previous HTC handsets. I never use the fourth search button on my Desire HD, so it’s a change I can’t complain about.

HTC One X quad-core Android smartphone

Screen resolution is a pin sharp 312dpi

The edge of the handset is interrupted only by a 3.5mm audio jack on the top, the power and volume controls and a micro USB port – with the optional AC M490 cable this connection provides an HDMI output. There’s no memory card slot but with 32GB on board I can live with that. The X takes a micro SIM rather than standard-sized card.

High performance access to file storage

Next page: Chart topper

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.