Feeds
90%
Elgato EyeTV DTT Deluxe

Elgato DTT Deluxe

World's smallest USB TV tuner

  • alert
  • submit to reddit

High performance access to file storage

The Deluxe's antenna slots into a wee MCX (Mini Coax) port at the opposite end to the USB connector. Elgato bundles a standard mini antenna with a magnetic base and separate suction cup. It pivots at the base to allow you to maximise reception, as does the separate, telescopic aerial it provides. The latter is handy if you don't want wires spoiling the lines of your laptop and is more travel friendly too. Finally, if you need a feed from a full-size antenna, there's a mcx-to-coax adaptor in the box as well.

Elgato EyeTV DTT Deluxe

Elgato bundles two types of mini antenna, including a telescopic one

You'll certainly want to use the adaptor if you plan to plug the Deluxe into a desktop machine or media centre near to your TV. We found the reception surprisingly good with a mini antenna - certainly better than it has been with TV tuners we've tried in the past in the same London locations and with the same antenna types.

That said, it's by no means a match for a proper feed - thanks to Freeview's broadcast strength rather than any failing on the tuner's part. Our initial, extensive tune-up in Register Hardware's sixth-floor, central London HQ still missed a number of channels and couldn't get sufficient signal for some of the others.

Elgato EyeTV 3

EyeTV 3 playback...

Adjusting the mini antenna helps - you'll appreciate the pivot when you're moving at around in search of a signal - but unless you're in a very good locale, you'll need a proper aerial feed if you want the full selection of channels.

Terratec Home Cinema

...and from Terratec Home Cinema

On a Mac, the Deluxe works with Elgato's EyeTV 3 software, which provides full DVR functionality, augmenting the over-the-air programme guide data with a year's free access to the TVTV online EPG. You can create lists of favourite channels; record, pause and rewind live broacasts; schedule recordings, top and tail them then convert them into formats suitable for playback on iPods, iPhones and Apple TVs.

High performance access to file storage

Next page: Verdict

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.