Feeds
70%
Creative Sound Blaster Tactic 3D Sigma

Creative Sound Blaster Tactic 3D Sigma gaming headset

Spatial delivery

  • alert
  • submit to reddit

High performance access to file storage

Crystal set

Configured this way taps into the headset’s THX TruStudio Pro software. Easy to use and instal, it’s better looking than the actual headphones with pleasingly large volume and mic controls along with a pretty 3D modelled forest scene to test video. Being a customisable skin, naturally I set the appearance to a purply pink.

Creative Sound Blaster Tactic 3D Sigma

Besides interface customisation, the large controls can also be altered from touchscreen PCs

The Sigmas have impressive frequency response from 20Hz to 20kHz and testing with the Beastie Boys album, Hot Sauce Committee, really showed off the intense, penetrating output this headset can deliver. From the off using the default settings, the Creative Sigmas can definitely do loud, without distorting.

Among the settings is the Crystalliser, which is supposed to add “pop” or sharpness to compressed audio, but despite fiddling with it, I found it didn’t seem to do anything impressive. Lest we forget LiveTouch, the interface's touchscreen compatibility, which is all well and good but I don’t know anyone who owns one. For fear of this review appealing to anyone under the age of 18, I am not even going to mention the voice morphing, but let’s just say I left it on emo.

Creative Sound Blaster Tactic 3D Sigma

TacticControl THX Sound Control Pro sound enhancement settings

The main selling point of these headphones is the 3D audio – delivering 5.1 and 7.1 soundfields from just two drivers with Creative's THX TruStudio Pro audio technology. After altering the Surround control when playing Left 4 Dead 2 I did find it quite immersive. I could hear the witch crying and the horde running clearly from the front, back, above and below. Woah, watch out for that helicopter!

Creative Sound Blaster Tactic 3D Sigma

High performance access to file storage

Next page: Mission creep

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.