Feeds
85%
Samsung P2370HD

Samsung P2370HD TV-monitor

A PC-TV display worth looking at?

  • alert
  • submit to reddit

High performance access to file storage

Review Combo TV-monitors are not a new idea, but all too often what you get is a standard PC monitor with a TV tuner bolted on. Yet with the P2370HD, Samsung has created a fully functional 23in widescreen TV, that’s designed to work just as well as a PC monitor.

Samsung P2370HD

Dual purpose: Samsung's P2370HD

The monitor is comprised of a standard 16:9 display with a native resolution of 1,920 by 1,080 pixels, making it capable of full-HD playback of Blu-ray discs and games from your PC or directly using HDMI. Being a TV, it also comes with built-in stereo speakers. Indeed, the P2370HD offers the best of both worlds, bringing the design and usability of a great TV to the desktop. Moreover, it highlights just what we’ve been missing in the PC world.

Convergence of HD TV and PC peripherals has brought some really good design to desktop monitors, many of which have already started to look like TVs. Glossy, piano black bezels and gentle curves all help your monitor to look just as good in your living room or bedroom as they do in your office.

The P2370HD is no exception. Not only does it have the aforementioned TV-like looks, it also adds touch sensitive, backlit controls and an angled transparent acrylic stand which makes the display seem to almost float in mid air. The stand is also removable, allowing wall mounting with a standard VESA 75 bracket.

Samsung’s trademarked “Touch of Color” design adds an almost homeopathically diluted amount of red tint to the bezel which actually succeeds in imparting a more expensive feel to the whole display. This is complemented by a row of illuminated touch-sensitive controls, which can be optionally turned off – at which point they become entirely invisible.

Samsung P2370HD

VESA mounting is an option

Powering the monitor you’re greeted with an entirely unnecessary chime of a cheerful arpeggio and a short light show. Whilst being slightly annoying, it’s also somehow re-assuring. It’s a welcome that suggests you’re going to be helped through this experience rather than left to fumble on your own.

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.