Feeds

Buyer's Guide: Freeview HD TVs

How to make your choice

  • alert
  • submit to reddit

High performance access to file storage

It's unlikely that you’d choose a set just because it had Daily Motion, rather than YouTube, but accessing online content is much more straightforward on some sets than others. While some have gone out of their way to provide a good range of material, others seem to have done the bare minimum. If you have a media streamer already, that may not matter – but at least some of these sets are coming close to replacing one.

Freeview HD TVs

On some sets, DLNA even offers the ability to act as a "media renderer", which means it can be controlled by an external device like a PC, or even some mobile phones. For example, I used a Nokia E72 as the controller, selecting content from a Synology network storage box or from the phone, to be displayed on the TV.

Think how well the set you fancy handles standard definition content. With just three HD channels broadcasting now, to be joined by a fourth before the year is out, a lot of what you watch is still going to be SD. With the wrong settings, like too much sharpness, and over-enthusiastic noise filtering, standard definition pictures – especially from lesser channels like More 4 – can look poor. So a good range of adjustments is vital.

With HD pictures, of course, comes better quality audio, in the form of surround sound. And if you’re hoping to get surround from a Freeview HD set, then the bad news is that things are just as murky as they proved to be when it comes to set top boxes.

Freeview HD TVs

In many cases, you won’t get surround sound by connecting the TV to your AV setup, as the necessary transcoding technology won’t become mandatory until next year – which might in itself be enough reason for some to consider postponing their purchase for the time being. Anything launched after April 2011 must have have transcoding if it's to sport the Freeview HD logo, and so will be able to produce a 5.1 signal that existing surround sound systems will have no difficulty handling.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.