Feeds
85%

Griffin Evolve wireless iPod speakers

Sound investment

Beginner's guide to SSL certificates

Rather than muck about with complicated clips or plugs, the speakers dock with the base station through three discrete contact points on the bottom of each speaker. It's a great idea, but we'd advise users to make sure the speakers are docked properly when putting them back as we found occasionally contact wasn't made.

Given that each speaker is packing an internal lithium-ion battery that provides around ten hours of operation, and an RF receiver capable of getting a clear signal at over 40m away, they are surprisingly light, making it easy to carry them around.

Griffin Evolve Wireless Speakers

The speakers are surprisingly light

The range is impressive, and for once it seems that the boasts made on the specification sheet aren't hyperbole. While there was occasionally some distortion while moving the speakers around at range, once you put them down the sound quickly resolved into as clear a signal as you get when they're docked.

If you're a hardened audiophile then stop reading now and start looking elsewhere. Although the frequency range and clarity of the speakers are quite good, they lack of any sort of sub-woofer or tweeters, and that means that the Evolve's 12W speakers battle when listening to tracks that have a thumping bass or high-pitch sounds, particularly when the sound is turned down low. That said, for general listening, the sound quality certainly isn't bad, particularly if you enjoy music along the lines of jazz and rock.

As you might expect, the range is hampered by obstructions, but 40m is a fair distance, so unless you're trying to reach the other side of your estate through several medieval castle walls, you shouldn't have too much problem.

Fortunately, Griffin smartly used radio transmission for the remote, rather than the more traditional infrared, meaning that you can control the unit from the same distance as the speakers. Still, we challenge anyone not to point the remote in the direction of the speakers when using it.

Internet Security Threat Report 2014

Next page: Verdict

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Microsoft fitness bands slapped on wrists: All YOUR HEALTH DATA are BELONG TO US
Wearable will deliver 'actionable insights for healthier living'
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
Amazon hopes FIRE STICK will light up its video service
We do streaming video? It seems we do...
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.