Feeds

3D TV: Avatar or Ishtar?

Do punters really want it?

High performance access to file storage

Heads or Fails We've seen plenty of forecasts predicting how many 3D TVs will be sold in the coming years - the latest, from UK-based IMS Research, puts the total at 218m shipped by the end of 2015 - but none that show that punters want or will use the technoology.

As we reported recently, there have been small spending surges in the US and Europe following the debut of 3D TV sets in these territories, but since there's no real amount of content, we have to attribute these sales to folk with too much money or at least more money than sense, and not real people.

We agree with IMS' Anna Hunt, who notes that “within five years, the majority of high-end large-screen TV sets and Blu-ray Disc players are likely to offer 3D capability". Eventually, all sets will have this feature as vendors struggle to sell more sets and the cost of adding the technology falls.

One day, all TVs will be made this way.

Content will come. Over here, Sky will start broadcasting 3D programming, eventually, and more and more 3D Blu-ray Discs will ship. Though, as Reg Hardware's recent 3D TV Group Test revealed, 2010's release list is all too brief.

But will punters adopt it? Most surveys which have asked retailers all mention that internet connectivity appeals to consumers more than 3D does, while in the UK specifically all the signs are that Freeview HD is the key draw pulling punters into the shops in search of a new screen.

As yet, though, no one appears to have questioned consumers here or elsewhere about whether they actually want 3D TV.

We see signs, admittedly entirely anecdotally, that even 3D in the cinema is proving to be less of a draw, so what chance has the technology got in the living room?

Based on the people we've asked over the past month or so - which we certainly don't pretend is a scientifically selected or statistically relevant sample - suggest of itself 3D TV will be no more successful than a one-legged man in an arse-kicking contest.

Is this view typical? Now's the chance for you to have your say, in the forum. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.