Feeds
60%
Olympus LS-5

Olympus LS-5 linear PCM recorder

Sound idea?

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

Sound Check

Audio mode is rather more interesting because it turns the LS-5 into a USB microphone. However, tests in this mode proved rather unreliable. When recording in both Sonority and Garageband, rather granular distortion crept in and wandered off again like dodgy FM reception. The buffering latency also went a bit haywire, going from its default delay at the bounds of acceptability to about half a second, with some noise added for good measure, and then back to normal again. Work in progress, evidently.

Olympus LS-5

In Audio mode, the recorder can function as a USB stereo microphone

Talking of which, use Sonority for any length of time and you’ll come to the conclusion that people who design dictation machines really have no idea about what makes a good audio editor. While this application does, surprisingly, allow layering of multiple tracks, it doesn’t have a loop/cycle function. It has a sprinkling of effects yet has the audacity to charge for more useful effects that the open source application, er, Audacity offers for free.

Olympus LS-5

Sonority: a bit of a clanger really – the effects offered for free are barely adequate
Click for a larger image

Also, if you fancy recording directly using the LS-5 as a USB mic, the only way you know what the input levels are, is when you start recording. Prior to that, there’s no input monitoring or pause/standby function. The real killer is playback. Hit the spacebar and away it goes, hit again – it’s going to stop, right? Nope, it keeps playing. It’s Shift-Spacebar to stop. WTF? Somebody at Olympus needs shooting, and given that this division works with dictators, you never know your luck.

Olympus LS-5

Editing on Mac
Click for a larger image

As a standalone recorder, the performance is pretty much identical to the LS-10. Choose the right mode and recording is clean and well-defined and easily configured, thanks to the handy controls on the side for recording level, along with switches for mic sensitivity and low cut filter.

Secure remote control for conventional and virtual desktops

Next page: Transport Dispute

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
Tim Cook in Applerexia fears: New MacBook THINNER THAN EVER
'Supply chain sources' give up the goss on new iLappy
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.