Feeds

Hands on with Acer's 3D laptop

Polarising specs at the ready...

High performance access to file storage

First Look Acer will enter the record books today by releasing the world’s first 3D-capable laptop. So Register Hardware caught-up with the firm behind the technology – Dynamic Digital Depth – to discover how 3D content will look on Acer’s machine.

The 15.6in Acer Aspire 5738DZG 3D laptop has a screen that is coated with a thin 3D film. You wear polarising glasses rather than active shutter or red and green anaglyph glasses.


Can't see the video? Download Flash Player from Adobe.com

DDD’s TriDef software, which can be used with any GPU, facilitates playback of both 2D and 3D content, company President Chris Yewdall told Register Hardware.

Our initial response to the on-screen 3D display was good and - despite it only being capable of a 720p resolution – the content was clear, crisp and vibrant.

The depth of the 3D image displayed depends heavily on the screen’s tilt angle. Angle the screen too far forward or too far back and you’ll probably only see a blurred 2D image – as you do when you take the glasses off altogether.

While the laptop is supplied with a stylish and light pair of polarising glasses, Yewdall claimed that opticians aren't too far away from offering to make up prescription 3D glasses. In the short-term, though, DDD can also supply a pair of clip-on polarising specs.

Asus_3D_02

Converting 2D into 3D is as simple as right click with TriDef

Acer’s 5738DG won’t display everything in 3D, so you can forget browsing through Windows 7’s icons in 3D or jazzing up Excel with 3D spreadsheets. TriDef is largely limited to media content.

TriDef enables almost any 2D content to be transformed into 3D, Yewdall explained, as he took us through a slideshow of 2D photos converted into 3D. He also showed us a selection of movies and games that TriDef converted into 3D.

For the user, this conversion process is as simple as right-clicking on say, a JPEG, and selecting “Play with TriDef Media Player”.

The difference in 3D quality between a film and JPEG or videogame was negligible, in our opinion.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.