Feeds
80%
Wii U

Nintendo Wii U Review

'Asymmetric gameplay', anyone?

High performance access to file storage

Paddle out

Storage solved, it’s on to the real reason we’re here: the GamePad. The presence of an easy to use tablet in your lounge will be a thrill for those who have yet to experience the joys of, say, an iPad.

The GamePad’s screen at 854 x 480 and 158ppi, while not as sharp as the iPad, still looks bright, vibrant and near enough to HD to mean you won’t miss it. It comes with touchscreen, stylus, camera, microphone, gyroscope and accelerometer. It’s also surprisingly light and ergonomically designed so that even my longest stints haven’t led to aches or finger cramping.

Nintendo Wii U

Birds of play

Quickly glancing from TV to GamePad, depending on the requirement of its games, soon becomes second nature. And I’ve yet to lose the buzz of swapping and changing the action from TV to GamePad to carry on playing even when the TV is unavailable.

Once a game is running on the GamePad play is lag free and the resulting visual down-scaling barely noticeable. However, a little experimentation revealed the GamePad’s roaming range is not as great as I’d hoped.

Moving about 5m away from the Wii U is enough to prompt the ‘corruption interrupted’ screen which means, sadly, that’s there’s no Mario while sat on the loo for me – a blessing no doubt. It did reach my bedroom though – Batman in bed anyone? – but don’t be surprised if its signal won’t permeate every room of your house.

Battery life is a concern too; it takes about three hours of play to drain, so you’ll have to plug the GamePad in to keep playing. Should you not happen to have a wall socket located handily next to your sofa of choice that’ll be an issue, plus the GamePad sure doesn’t look as pretty with wires sticking out of it.

Wii U GamePad

The processing power of the Wii U is a further point of discussion. Hard tech facts like it has an IBM Power multi-core processor, 2GBs of DDR3 SDRAM (1GB to the OS and 1GB to the games), an AMD Radeon-based High Definition GPU, don’t really say much to the average consumer.

Nintendo Wii U Vital Stats

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.