Feeds
75%
Samsung B2700 Bound

Samsung B2700 Bound rugged mobile phone

  • alert
  • submit to reddit

Security for virtualized datacentres

Around the sides, the power/headphone socket is covered by a sturdier than usual grommet, and there's a volume rocker, camera shutter button and a dedicated flashlight key. This isn't a camera flash – the bulb is in the top of the phone so you can use it like a torch. It's surprisingly bright, and more than enough for reading a map on a windswept moor at midnight. Also at the top is a strap loop that you can attach to your backpack or belt.

Samsung B2700 Bound

Has a handy backpack attachment

Battery security is tighter than normal, and we found the back impossible to remove with our fingernails alone, resorting to a coin to spring the back from its extremely tight clip.

The camera is perhaps a little less than we'd expect from a mid-range phone these days, with just two megapixels – though that's still much better than its 0.3Mp predecessors. Access speed is reasonable, taking about three seconds to launch with a prolonged press on the camera shutter button. The maximum resolution is 1600 x 1200 pixels, and there's a multi-shot mode that can take six, nine or even 15 shots. There's also timer - up to ten seconds - and mosaic effects.

Picture quality certainly isn't disgraceful but obviously limited by the low pixel count and a lack of autofocus. Good light is essential, especially since there's no flash, but even then, shots never seem to look particularly sharp, though it's fine for basic snaps.

Video, as usual, takes a step down from still picture quality, with the B2700 offering just 176 x 144 pixels at 15f/s – basic stuff, in other words. There's also a 640 x 480 (0.3Mp) camera on the front for video calling.

Samsung B2700 Bound

Well sealed against dust and water

The music player is the standard Samsung model and decent enough it is too, with options for podcasts as well as your most frequently played and most recently played tracks. It can handle all the major compressed formats, including MP3, AAC and WMA but with just 26MB of on-board memory it won't hold much, though you can add up to 8GB via Micro SD card - there's none supplied, however.

New hybrid storage solutions

Next page: Verdict

More from The Register

next story
Apple iPhone 6: Missing sapphire glass screen FAIL explained
They just cannae do it in time, says analyst
Oh noes, fanbois! iPhone 6 Plus shipments 'DELAYED' in the UK
Is EMBIGGENED Apple mobile REALLY that popular?
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
The Apple Watch and CROTCH RUBBING. How are they related?
Plus: 'NostrilTime' wristjob vid action
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Half a BILLION in the making: Bungie's Destiny reviewed
It feels very familiar - but it's still good
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.