Feeds
75%
Nokia N8

Nokia N8 smartphone

Semi-evolved Symbian?

  • alert
  • submit to reddit

High performance access to file storage

Photo Finnish

If you have Vista or Windows 7, or throw something like Twonky onto Mac or a Linux box, you have a DLNA network, and since your phone is almost always to hand, you have an extra pair of speakers. DLNA first appeared on Nokia handsets four years ago and when even Nokia's E-series business phones include this, you wonder what's going on out there, to quote Fred Trueman.

Nokia N8

The 12Mp camera also packs a xenon flash

Photography is the centrepiece of the N8, and lots of work has gone into this. The camera features a custom five-part fixed aperture f2.8 Zeiss lens. Its 5.9mm focal length is equivalent to a 28mm wide-angle lens on a 35mm camera. There’s digital zoom, which is capped at 2x for photographs and 3x for video. At 1/1.83in the sensor is, apparently, the largest to be installed in a mobile phone and is capable of 12Mp images. More significantly, the N8 really endeavours to minimise image processing where possible. So in good light, edge enhancement and noise reduction are set to a minimum.

The xenon flash, a rarity even on smartphones, produces excellent illumination although video recording can't use it, of course. The N8 offers 720p HD video recording at 25fps. It can capture smaller sizes up to 30fps, or lower for low light movies. The digital zoom is anything but smooth, however, sound quality is particularly impressive. The handset can capture stereo audio using its two microphones, front and back. Audio is encoded into 128kbits/s AAC format.

Sample HD Video

Can't see the video? Download Flash Player from Adobe.com

Overall, the camera can deliver spectacular results. In tests, using its simple control functions for tasks such as closeups works out better than relying on the automatic settings. The onscreen "shutter release" button rather often worked out better than the physical button, which seemed more prone to introducing camera shake. A nice touch is that the N8 saves your favourite configurations.

Nokia N8

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.