Feeds
95%
Samsung Galaxy Note 2 GT-N7100 Android smartphone

Samsung Galaxy Note 2 review

The most complete digital communications device known to man?

  • alert
  • submit to reddit

High performance access to file storage

Bonus points

Being a Samsung device Android is here overlaid with TouchWiz but I’m prepared to forgive it this foible even if it’s a bit like painting a moustache on Rossetti’s Beata Beatrix. Yet, with all the extra functionality built into the Note 2, there is at least a solid reason for messing around with Google’s mobile OS beyond the simply aesthetic or bloody minded.

Samsung Galaxy Note 2 GT-N7100 Android smartphone Samsung Galaxy Note 2 GT-N7100 Android smartphone

Memo options: handwriting recognition and note taking

Make no mistake, Samsung has added a truly bewildering – perhaps even excessive – amount of extra functionality the Note 2. Gesture commands, floating video screens and context-aware home pages. There's also a funky auto-rotate feature that uses the webcam to judge the angle of a line between your eyes relative to the device, which is handy if you are using the Note while lying down. The list just goes on.

Lest we forget the S Pen which is the Galaxy Note 2’s party trick. With this stylus, you can write, sketch, doodle and grab the screen in all manner of useful ways. Damn shame though that screen video record function seems to have bitten the dust between Samsung’s video guide and the Note 2 hitting the shelves.

The new Pen has an oblong rather than round profile making it easier to hold and easier to slot into its bay the right way. There's no lanyard to connect S Pen to Note but if it detects you walking away without replacing the stylus it will start beeping which is useful.

The Note’s screen can sense the pen before it touches down, thanks to a feature called Air View. Hover over a gallery, video or e-mail with the stylus and a preview of the file opens. I have to admit this is not a feature I've been crying out for on a mobile phone but it is pretty cool. Handwriting recognition is also much improved over the original Note.

Samsung Galaxy Note 2 GT-N7100 Android smartphone

High performance access to file storage

Next page: Under pressure

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.