Feeds
75%
Yamaha TSX-130 iPod dock

Yamaha TSX-130 iPod dock

Quality player?

  • alert
  • submit to reddit

High performance access to file storage

Station search and switching is fast and the DAB platform can store a generous 30 stations, all easily programmable and accessible. During tests, the DAB stations delivered a strong and clear sound with no pops or drop-outs – something that our reception often suffers in this region. With its ability to deliver a natural sound, the TSX-130 performs better still with FM, producing plenty of warmth and sonic detail on Radio 3 and 4. Thoughtfully, 30 presets FM stations can be stored too.

Yamaha has a lot of experience in building platforms for discs, so you would expect the CD deck to be pretty good and you would not be wrong. Reading from CD, including CD-R/RW, is quick and, again, the information displayed is plentiful. To kick things off with the CD testing, we decided to give a few tracks from Audioslave a spin. Lots of rumbling base, vocal pyrotechnics and attacking rock guitar offered a decent challenge.

Yamaha TSX-130 iPod dock

Easy access to iPod functions from this remote

Now you could argue that the band themselves never really gelled as a unit, so the mix can feel a little disjointed and unfocused, especially with weaker systems. However, the TSX-130 has the punch needed to carry the music and recreates a surprisingly wide sound stage with good depth. The unit can achieve a 30W output from its 15Wx2 amplifier, delivered through its twin 8cm speakers. Indeed, it can go surprisingly loud with very little distortion, helped along by two rear-mounted bass ports.

The product also gets some brownie points for providing non-iPod owners with a top mounted USB port. There’s no 3.5mm audio input socket. Instead, the TSX-130 can read from USB storage devices and players. We plugged in a Samsung MP3 player from the company’s YP range and opted for a bit of Little Fluffy Clouds by the Orb. Again a wide and detailed sound stage was produced, although not on the same level as the CD player. Still, the machine does a decent job of maximising the sonic capabilities of MP3 files, and will also play WMA files.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.