Apple iPad review
Are we still as enamoured with the Apple iPad following our first look? We review Apple's latest device to find out.
There are 11 home screens and each can accommodate 20 applications. Each app icon is the same size as on the iPhone, so you'll notice there's lots of space around each. This may not be the most attractive way of doing it, but we think adding more icons would make it much harder to find the app you're looking for, so can see the reasoning behind the decision.
Preloaded apps are pretty basic, although that's why the app store is such a success.
The first app of note is the email app that works much better in both landscape and portrait mode. If you have an iPhone, you'll find the email set up is identical, and that means seamlessly easy to set up. Forget having to add every single little detail as you do on Android and BlackBerry devices. You simply need to add your email address, domain, user name, password, give the account a name and, hey presto, your emails will start to filter through, even when using Exchange.
Open the Mail up and you'll find it's probably the most computer-like application possible to use on the iPad (save for Pages and Numbers that we'll cover later).
In landscape mode, your inbox is displayed on the left side of the app with the selected email showing on the right.
Some attachments (such as photos) appear in the body of the email, but you can click on them to make them full screen or open them in a third party app you may have downloaded. We were able to open a word document in Pages after we had bought the document editing app.
In portrait mode, the inbox will appear as a pop up over the top of the main window.
In This Article
How virtual desktop infrastructure enables digital transformation
Challenges and benefits of VDIFree download
The Okta digital trust index
Exploring the human edge of trustFree download
Optimising workload placement in your hybrid cloud
Deliver increased IT agility with the cloudFree Download
Modernise endpoint protection and leave your legacy challenges behind
The risk of keeping your legacy endpoint security toolsDownload now