Feeds
85%

Sony Walkman NWZ-E436F music and video player

Budget iPod Nano beater

High performance access to file storage

We found the sound of the E just a little raucous out of the box, but once we moved the EQ settings to Pop, things improved mightily. A few moments' more spent fiddling with the equaliser paid even bigger dividends, resulting a sound that was firm, focused and nicely balanced.

Sony Walkman NWZ-E436F

No Ogg or FLAC - or even ATRAC support

Video playback is supported up to 30f/s 320 x 240, and the device can be set to play in landscape as well as portrait, but customers without suitable software will need to cough up £6 to enable the transcoding feature on the bundled Sony Media Manager software. We thought this was taking the proverbial when we came across it while reviewing the A-class Walkman, and time and tide have not changed our opinion.

The E is one of the media players supported by BBC iPlayer downloads. By way of a quick test, we downloaded the 25f/s file of episode 4 of Little Dorrit, and while it was perfectly watchable it did look rather jerky. Still, who buys a 2in-screen MP3 player to watch Dickens adaptations?

The E has gumption enough to load as either an MTP or mass-storage device depending on the host, and for Windows users there's also a handy little Content Transfer app on the bundled CD. This is a small window that can be pinned on top of your other applications that allows you drag and drop content directly from iTunes or Windows Media Player. It's effectiveness is a little stunted by the fact that you can't drag artists or albums across, only the actual tracks, leading to a lot of shift-selecting. But it is handy for iTunes users who don't want to have to rummage about in their iTunes folder trying to find just where the hell it has put the other half of that album...

Sony Walkman NWZ-E436F

Sony in 'working well with iTunes' shock

But spare a thought for the poor Sony staffers who had to develop software to allow their Walkman players to cosy up to iTunes. The humiliation must have been unbearable, akin to being sent to a convent school outside Heidelberg to spend the rest of the war teaching the young girls home economics.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.