Feeds
75%
Samsung P3

Samsung P3

iPod Touch worrier?

  • alert
  • submit to reddit

High performance access to file storage

Apart from audio and video playback the P3 also supports JPEG, PNG and BMP image files, has a non-RDS FM radio with a record facility, a voice recorder and stereo Bluetooth. The P3 also supports Shockwave Flash (.SWF) files and games, though ours only came pre-loaded with, of all things, a virtual metronome.

Samsung P3

Not a bad music player

The P3's Bluetooth worked remarkably well, hooking up to a Sony Ericsson K850i phone - to swap content and work as a hands-free speaker - a Dell laptop and a pair of Sony Bluetooth headphones without any issues.

Finally, you can use the bundled EmoDio media manager software to convert text files into Text-To-Speech files that the P3 can then read back to you. This worked remarkably well if our experiment with a chunk of Northanger Abbey was anything to go by.

The P2 was always one of the better sounding PMPs on the market but Samsung has raised its game with the P3 to put it right up alongside Sony's S-series Walkman as one of the best sounding music players currently available. It's just a shame that, unlike Sony, Samsung didn't see fit to supply the P3 with a decent set of earphones, the bundled earbuds being rather cheap and dismal affairs.

The P3 is a loud one too. My God, but it pumps out some volume. Using the office Sennheiser HD-25s, our ear drums cried 'enough!' well before the P3 ran out of steam, making it a solid choice for anyone who regularly listens to their music while flying.

Like the Q1, the P3 comes with Samsung's DNSe3 sound modification software, which, if a little complicated – especially after the on/off simplicity of Philips' FullSound system – does allow you to mess about with the P3's sound profiles until the sun falls out of the sky and to put some of the life back into lower-quality lossy music files.

Samsung P3

Plays Flash games too

When watching video you can access a simplified version of DNSe3 that lets you swap the sound profile between Normal, Drama and Action, each setting altering the balance between the various dynamic parts of the soundtrack.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.