Feeds
95%

Logitech Squeezebox Duet multi-room music streamer

Slim Devices' winner revamp

3 Big data security analytics techniques

The SqueezeCentre software makes a very good job of importing media libraries. With a few clicks, we ended up with a near perfect recreation of our 7000-song iTunes music library on the Duet, complete with all our playlists. Album artwork import was a touch hit and miss, but no worse than we really expected. If for any reason you don't like the way SqueezeCentre does its thing with your media library there are a fair number of options that allow you set things up just so.

Logitech Squeezebox Duet

All the network and audio connections you could want

Every time you fire up SqueezeCentre it takes a quick shoofty in your pre-defined music folders and loads anything new into its library. All this takes place discreetly in the background, so as far the user is concerned the Duet's library is always bang up to date.

When it comes to playback quality, the bit rate and type of the files in your library, and the quality of the stereo, will have far more of an impact than anything the Duet does.

Stuffing 160Kb/s MP3 files in at one end and playing back through a pretty workaday LG 5.1-channel home cinema system isn't going to blow you out of your seat, though when we did exactly that we were pleasantly surprised by the quality of the sound. The fact, the receiver has built in amplification which helps things along no end. And no matter how we rigged the Duet up we never found ourselves wanting in the volume stakes.

Logitech Squeezebox Duet

You'll need the controller's charging cradle frequently

File support isn't half bad, with the Duet supporting MP3, AAC, WMA, Ogg Vorbis, Flac, Apple and WMA compressed, and WAV, PCM and AIFF uncompressed music files. Of course, songs need to be non-DRM. If your music library is full of stuff you bought from iTunes rather than stuff you just store using iTunes, you'll be in for a bit of a disappointment.

SANS - Survey on application security programs

Next page: Verdict

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Hearthstone: Heroes of Warcraft – A jolly little war for lunchtime
Free-to-play WoW turn-based game when you have 20 minutes to kill
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.