Feeds
70%
Xtreamer iXtreamer

iXtreamer dock with IPTV

Media hub for iFans

  • alert
  • submit to reddit

High performance access to file storage

Media savvy

Although it works well, the only real advantage of using the iXtreamer over an Apple dock is the ability to browse your music library on your television. If you wish to view pictures, you must manually start the slideshow on your iOS device first. This kind of behaviour makes the experience feel unfinished, almost as if there was no real effort to implement proper support.

Xtreamer iXtreamer

Hook it up to an USB DVD drive and it'll play discs too

Docked Apple devices aside, the iXtreamer is actually quite a capable media streaming box. Despite lacking a gigabit Ethernet connection, featuring only a 10/100Mbps LAN port, even 1080p video can be streamed if encoded using modest compression. Users may encounter issues with higher bit-rate files, but this is really to be expected without a gigabit connection.

Also pleasingly, the iXtreamer supports a large number of media types, unlike other proprietary solutions that can be quite restrictive. Although the iXtreamer features support for most UPnP media servers such as TwonkyMedia and TVersity, it lacks support for the iTunes DAAP protocol, something which should surely be present as this is a product clearly targeted towards Apple users.

Aside from the usual local streaming features, the iXtreamer packs a fair number of open-source community developed goodies under the Xtreamering menu. These include a Grooveshark jukebox (requires a paid Grooveshark Anywhere account), xVOD – a MegaVideo streaming service, Xtreamer Live, YouTube, Internet TV through Xtreamer On Air, along with Internet news and weather services.

It doesn’t stop there though, there’s yet another feature. Through the use of a USB or networked DVD player, the iXtreamer can also play your DVD collection. Using a Plextor PX-L611U external USB DVD writer, I found playback to be of excellent quality, in fact just as good as any standalone player I have ever used.

Xtreamer iXtreamer

High performance access to file storage

Next page: Good all-rounder?

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.