Feeds
75%
Lenovo ThinkPad Android Tablet

Lenovo ThinkPad Tablet

The formal fondeslab

  • alert
  • submit to reddit

High performance access to file storage

Buttoned up

Thankfully the bundled earbuds are very good and come with a funky ThinkPad-branded toggle bag. Even so, if you plan on using the speaker as the main audio source from your tablet I would seriously suggest you look elsewhere.

Lenovo ThinkPad Android Tablet

You don't have to use the stylus, but it may come in handy

Unique to the ThinkPad are the four physical buttons that reside below the screen when you hold the device in portrait which seems to be the way the maker imagines it will be held most of the time, judging by the orientation of the logos.

As well as the expected home, back and browser launch buttons the fourth locks the screen orientation. In my book this is a very good idea, though Lenovo has missed a trick by not back-lighting the keys. If they start to irritate you, the hardware keys can be disabled.

Lenovo ThinkPad Android Tablet

The 3.5mm audio jack supports headsets and given the speaker quality you'll probably need to use one

Also separating the ThinkPad from the herd is the red-topped N-trig digital pen. Alas, there isn’t the same degree of built-in-at-ground-level pen technology as the Samsung Galaxy Note enjoys. For instance, there’s no facility to take a quick screen grab and doodle on it.

The ThinkPad’s pen also only supports 256 levels of pressure sensitivity compared to the 512 of the Note’s Wacom pen and it requires an AAAA battery to work. For general system navigation and note taking, it works a treat but it's a bit disappointing that Lenovo’s own App Shop contains not one pen-optimised application.

Lenovo ThinkPad Android Tablet

No flash on the main camera, but who takes photos with a tablet anyway?

The main 5MP camera is a flash-less and mediocre affair but the forward facing 2MP lens works well with Skype and makes for very crisp and clear video calls. Yet again, you’ll need to use the earphones to hear what’s being said to you.

lenovo thinkpad android tablet

High performance access to file storage

Next page: Access denied

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.