Feeds
80%
Tron: Legacy

Tron: Legacy 3D Blu-ray disc set

2011's home cinema demo movie?

  • alert
  • submit to reddit

High performance access to file storage

A certain ratio

Both Blu-rays feature the IMAX cut of the film. This version has around 40 minutes of vertically expanded material, originally composed for the larger IMAX screen. Consequently, the aspect ratio sporadically shifts from 2.35:1 widescreen (with black bars top and bottom) to 1.78:1 (full 16:9). Last time saw this dual aspect ratio trick used was on The Dark Knight Blu-ray.

Tron: Legacy

Fancy a blue lagoon?

The soundtrack is a DTS HD Master Audio 7.1 mix, and it rocks. There’s more ludicrous LFE here than on all the Blu-rays I’ve watched over the past six months combined. Daft Punk’s electro-symphonic score pounds relentlessly from every corner of the room, for the best part of 125mins. Great if you live in a detached house, potentially nightmarish if you don’t. I’d rate it as the best Blu-ray soundtrack since Inception.

There’s only a moderate collection of bonus features, which are confined to the 2D disc. These include some behind the scenes stuff, a mockumentary to link the two films and a teaser for the new Tron animated TV series. Tellingly, there’s no BD Live content.

Tron: Legacy

Beam me up

Verdict

While the merits and logic of the storyline can be debated, there’s little doubt that Tron: Legacy sets a new benchmark for the 3D Blu-ray format. With Avatar 3D still unavailable to buy, this should be considered the must-have demo disc for 3D TV owners. Even if you’re pondering a 3D upgrade later in the year, you'll still have all bases covered if you spring for this version now. Resistance is futile – oops, sorry, wrong franchise. ®

More AV Reviews…

Arcam
FMJ AVR400
AV receiver
Samsung
BD-D6900
3D Blu-ray player
Panasonic
TX-L37DT30
3D TV
Six... budget
Blu-ray players
Group Test
AV Receivers

High performance access to file storage

80%
Tron: Legacy

Tron: Legacy 3D Blu-ray disc set

Raises the bar for the 3D Blu-ray experience, even if the screenplay doesn't quite manage the same level of entertainment.
Price: £30 RRP

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.