Feeds
85%

Sony Bluetooth Walkman NWZ-A826K

Better late than never?

Next gen security for virtualised datacentres

Of course, these days back-to-back tests of this nature are rather complicated by the plethora of music filters and enhancers fitted to music players. The Walkman comes with two user-definable and four pre-set EQ settings, and four sound modifiers: VPT for a surround sound effect, itself with six sub-settings; DSEE for an enhanced stereo effect; Clear Stereo and Dynamic Normalizer.

For the purposes of this test we compared the Walkman back-to-back with a 4GB iPod Nano using the Sony's supplied earphones and our usual Sennheiser HD 25's.

Sony Bluetooth Walkman NWZ-A826K

The controls are simple enough to master

Switch all that unnecessary guff off and the Walkman has the more solid bass, the better defined vocal line - consonants blurred on the iPod are far clearer on the Walkman - and a generally more satisfying sense of balance and space. The Walkman also pumped out a fair bit more volume, a handy feature if you are going to be using your player in a loud environment.

When we played the same tunes back-to-back through each players supplied earphones the Walkman beat the iPod like a fat kid stealing someone's lunch. We would even go as far to say that the Walkman shades the Samsung P2 when it comes to sound, and that takes some doing as the P2 impressed us mightily.

Sony Bluetooth Walkman NWZ-A826K

Many MP3 player makers could learn from Sony on the subject of bundled earphones

Happily enough, the sound didn't take as precipitous a dive into the toilet bowl when using the Bluetooth headphones as we had feared it might. Sure, there was a noticeable drop in quality especially in the bass, but the listening experience was still far from unenjoyable.

One thing we didn't like about the Bluetooth listening experience was the fact that the volume control on the headphones is a little too close to the track-skip switches, resulting in us often changing the track rather than the volume level.

Secure remote control for conventional and virtual desktops

Next page: Verdict

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
End of buttons? Apple looks to patent animating iPhone sidewalls
Filing suggests handset with display strips
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.