Feeds

Avatar expands 3D TV interest

Making punters keener to buy too?

High performance access to file storage

Hit movie Avatar appears to be persuading punters - in the US, at least - that it might soon be possible to view 3D films on TV at home. Whether it will convince them to buy into the notion is another matter.

Electronics price-comparison site Retrevo said yesterday that while a mere 39 per cent of consumers were aware of 3D TV in the home before the release of Avatar, that figure rose to 60 per cent after the film's debut.

The movie's benefits for sellers of 3D TV kit is less clear cut. Before Avatar premiered, more than a quarter of consumers — 27 per cent — said they'd buy a new telly to experience 3D at home.

After the arrival of Dances with Wolves in space — surely 'James Cameron's spectacular 3D epic', Ed — the number of potential 3D TV buyers rose, but only to 32 per cent of the total.

Still, even if Avatar hasn't done as much to encourage people to buy a 3D TV as it has to evangelise the concept, that's still a lot of folk willing to part with their hard-earned for a new telly.

Which is good news for Sony, Panasonic, LG, Toshiba et al, though they'd better bundle plenty of the glasses you need to view stereoscopic 3D material.

Retrevo found that a whopping 65 per cent of respondents would only buy 3D specs if the devices costs $10 (£6) or less. A further 25 per cent said they'd be happy to spend up to $25 (£15) for specs but no more. Only ten per cent said they wouldn't object to paying more than $25.

As the company notes: "Won’t consumers be surprised when they discover that an extra pair of active shutter glasses is going to cost around $30 or more?"

Interestingly, while only a small percentage of survey respondents grumbled about the comfort of the glasses they'd had to wear to watch 3D movies, that percentage almost doubled in Avatar's post-premiere period. Vendors, take note.

Retrevo's conclusions were drawn from surveys of its own users, though how many of the the site's 5m visitors were sampled, it didn't say. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.