Feeds
80%
Sony E444

Samsung YP-Q2 v. Sony E-series deathmatch

Sounding out two top 8GB media players

  • alert
  • submit to reddit

High performance access to file storage

Head-to-head With the market for mid-range MP3 players never having been more competitive, seeing Sony and Samsung fight it our for advantage is like watching two wannabe WAGs scrap over a premiership footballer who is rumoured to be hung like a horse and has a Manchester City transfer cheque in his pocket.

Sony Walkman E444

Sony's Walkman E444: the better looking of the two

So with both Sony and Sammy releasing new media players with similar specifications at the same time and at virtually the same price Register Hardware thought it would be a good idea to review them together. Another reason for doing so is that both devices are direct replacements for media players that we reviewed towards the end of 2008: the Samsung Q1 and the Sony NWZ-E436F.

Sammy's Q1 was a player that didn't really impress us. The controls where a horrible example of design taking precedence over function and, try as we might, we couldn't get the thing to show up on the desktop of either a Linux box or a Mac. On the plus side, it sounded good.

Thankfully, this time round, Samsung has reconsidered the controls. We're still not convinced a wholly flat, smooth and solid touchpad is the best way to control a media player. Still, the Q2 does what you expect it to when you touch any of the seven controls.

Of course, being touch-sensitive, the slightest inadvertent knock or tap can interrupt playback. This can become annoying if you keep forgetting to lock the player's controls before slipping into your pocket.

There has never been much wrong with the controls on Sony's media players. OK, they may be a bit, what's the word? Oh yes, ‘ugly’. However, they are very well laid out and largely idiot-proof. Indeed, the E444's controls are even more idiot-proof than usual.

Samsung YP-Q2

Samsung's YP-Q2: the one that supports the most media formats

Sony has increased the size of the circular navigation rocker by about 50 per cent over the previous E-class models. This has been achieved by the simple and visually rather satisfying ploy of letting the Back/Home and Option/Power buttons take a chunk out of the navpad.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.