Feeds
70%
Viewsonic VMP74

Viewsonic VMP74 1080p media player

You want codecs? It's got 'em

  • alert
  • submit to reddit

High performance access to file storage

Review For most of this century, I've evangelised home movie set-ups that put a lightweight, probably Linux-based player in the living room, leaving your multimedia libraries on a server at the other end of your network.

Viewsonic VMP74

Viewsonic's VMP74: compact casing - but what a lot of codecs it contains

My favorite player has always been the Pinnacle ShowCenter, a pioneering device that lost its way in the market when five years ago Pinnacle fell into the insensitive clutches of the Avid Corporation. The ShowCenter's video decoding capability, alas, stops with the now ageing H.263 (XViD, etc) codecs. To carry me forward into the era of H.264, Viewsonic's new VMP74 might just be the proposition I'm looking for.

While the older generation of players like the ShowCenter tended to favour traditional hi-fi form factors - although this left them filled mostly with air - the VMP74 is less than 30mm in height, around 130mm wide and 100mm deep.

There's no wireless connection, but any device like this that pushes out true HD would probably struggle to suck in 1080p input over the air. My ShowCenter - it maxed out at 720p - was never convincing over 802.11g, so I don't see the Viewsonic's wired-only LAN link as an important limitation.

The huge spectrum of codec specifications is down to the talents of the Sigma Designs SMP8654AD processor. This extraordinary single chip not only decompresses video and audio, with post-processing functions like deinterlacing and deblocking, but also handles the Ethernet and the USB. The VMP74 has a pair of USB connectors at the rear, one of them doubling as an eSata port. And, yes, the Sigma chip takes care of the eSata protocol too.

Viewsonic VMP74

Good range of ports - but component-video would be handy

Oh, and it also negotiates "a wide variety of Digital Rights Management solutions", which should be reassuring to those of you who are gagging to play content-protected WMV 9 files.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.