Feeds
75%
Cambridge Audio Sonata NP30

Cambridge Audio Sonata NP30 hi-fi streamer

Hi-res, networked musical box

  • alert
  • submit to reddit

Business security measures using SSL

Review Sound quality isn’t always the first consideration in the world of digital music, where songs tend to be compressed for convenience, rather fidelity. That’s where Brit hi-fi brand Cambridge Audio hopes to make its mark with the NP30 (Network Player 30), which offers better-than-CD hi-res 24-bit audio playback for music files and Internet radio over your home network.

Cambridge Audio Sonata NP30

Cambridge Audio Sonata NP30

Lacking an amp and speakers, the NP30 has been designed to fit in with the company’s swish-looking Sonata range – such as the AR30 amp (and CD30 and DVD30) – but it can be connected to virtually any set-up using its standard stereo analogue outputs. You can also use digital S/PDIF and optical outputs for connecting to higher quality DACs and there’s a trigger connection that allows the NP30 to automatically power up when the amp it’s connected to is switched on.

Unlike similar devices such as Sonos or Squeezebox, the NP30 is a native 24-bit player with a built-in 24-bit/96kHz Wolfson DAC, which puts it well above CD’s 16-bit/44.1kHz resolution and firmly in the hi-fi category. While you can stream full 24-bit files using the on-board Wi-Fi, Cambridge Audio recommends using the Ethernet connection, so there’s less chance of interference, though I didn’t notice any when testing.

As well as getting the music off your computer, Cambridge Audio’s UuVol streaming service offers over 20,000 Internet radio stations that you can sort by the usual location and genre, and search by name. Using Uuvol’s web portal you can also search by bitrate and add non-UuVol stations too.

Cambridge Audio Sonata NP30

Wi-Fi on-board, but streaming using Ethernet is recommended for 24-bit audio

It also offers additional streaming services with BBC iPlayer (radio), Live365, Aupeo and MP3Tunes and you can access podcasts too, at least from the BBC and BlogTalkRadio. There’s no Spotify, Napster or Last.FM yet, but CA says they’re negotiating for licences now. You can also play back tracks from a storage device from its USB port.

Cambridge Audio Sonata NP30

Secure remote control for conventional and virtual desktops

Next page: Remote options

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
4K-ing excellent TV is on its way ... in its own sweet time, natch
For decades Hollywood actually binned its 4K files. Doh!
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
DARPA-backed jetpack prototype built to make soldiers run faster
4 Minute Mile project hatched to speed up tired troops
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Apple's Watch is basically electric perfume
It isn't just me-too Apple that's lost its lustre: Gadget mania is over
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.