Feeds
80%
Creative Labs ZiiSound D5

Creative ZiiSound D5 wireless speakers

iOS-friendly Bluetooth music box

  • alert
  • submit to reddit

High performance access to file storage

The BT-D5 is specifically designed to plug into the dock connector on an iPod, iPad or iPhone, so it won’t work with mobile phones or portable devices from companies other than Apple. There is a USB version of the transmitter, called the BT-D1. This will allow you to use the apt-X codec with any computer that has a USB port, but it costs an extra £40, which pushes the total price well over the £300 mark.

Creative Labs ZiiSound D5

BT-D5 Apple-friendly dongle, a USB alternative is an optional extra

Pairing the D5 with a Bluetooth device is very simple, as you simply touch the ‘Connect’ control on the front of the speaker for about three seconds to make it enter pairing mode and then activate the Bluetooth feature on your phone or other device.

The audio quality using standard Bluetooth is very good. The main weakness is the lack of a sub-woofer – the bass output at lower levels is quite weak, although there’s a port on the back of the speaker unit that does help to add a bit of resonance to the sound once you push the volume up a bit.

The touch-sensitive volume control is rather slick, displaying a trail of lights as you slide your finger over the control panel. The sound quality does start to become distorted once you push the volume control past about 80 per cent – but that was also the point at which I started to worry about annoying the neighbours, so I probably wouldn’t go much higher than that anyway.

That said, the D5 isn’t powerful enough for a full-on party, but it’ll do very nicely if you want to invite some friends around for dinner or a BBQ in the garden. The Bluetooth reception is also very good. Creative claims that the Bluetooth range is up to 10m ‘in open space’, but I was able to wander from room to room at home with my iPod Touch without the slightest interruption to the streaming audio.

Creative Labs ZiiSound D5

High performance access to file storage

Next page: Verdict

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.