Feeds

Review: Britain's 4G smartphones

Nine handsets, one network - is it time at last to invest in LTE?

New hybrid storage solutions

Samsung Galaxy Note II

If you can get past the size - not easy I grant you; I waver between thinking it’s not that massive to guffawing at the sheer absurdity of it - then the Note II is a technological beast of a device in all ways. The whopping 5.6-inch, 1280 x 720 AMOLED screen makes web browsing and gaming a visual feast while the stylus offers a host of handy extra functions.

Samsung Galaxy Note II

Of course the real value of the Note as a 4G device is that vast, removable battery. This is the only phone here that can actually be used consistently on a 4G network and not have you checking for the nearest power socket in a cold sweat every half an hour. It’s near-tablet dimensions also go some way towards justifying the whole 4G idea - you can do so much with a Note that maybe, just maybe screaming data speeds are worth paying for after all.

More Info Samsung

Samsung Galaxy S III

All the ingredients that have made the S III a worldwide sales hit are present and correct in the LTE version, though sadly so is the standard 2100mAh battery. Since the S III already has a removable battery it would hardly have been an engineering challenge for Samsung to have installed a larger one. But as the S III already lasts longer on a charge than any other handset here bar the Note II I can’t spank it too hard for that failing.

Samsung Galaxy S III

With a vivid 4.8-inch, 1280 x 720 AMOLED screen and a heavily modified version of Android Jelly Bean with all manner of extra goodies built in, the S II is a lot of smartphone for the money. It’s powerful too thanks to a 1.4GHz quad-core processor. I’ve heard tell that this i9305 model has 2GB of Ram, but mine only seemed to have the usual 1GB. With a Micro SD slot to back up the 16GB of built-in storage, it’s not hard to understand why the world and his wife wants one of these things - and why it has put the wind up Apple.

The UK's 4G phones at a glance

More Info Samsung
Phone comparison table 1
Phone comparison table 2

Secure remote control for conventional and virtual desktops

Next page: The Reg Verdict

More from The Register

next story
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
Shades of Mannesmann: Vodafone should buy T-Mobile US
Biting the bullet would let Blighty-based biz flip the bird at AT&T
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Net neutrality fans' joy as '2.3 million email' flood hits US Congress
FCC invites opinions in CSV format, after Slowdown day 'success'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.