Feeds
85%
Onkyo TX-NR609

Onkyo TX-NR609 AV network receiver

Multichannel maestro

  • alert
  • submit to reddit

High performance access to file storage

Review AV receivers have made a concerted effort to keep up with TVs, consoles, set-top boxes and disc players in recent years by incorporating an Ethernet port to play your digital music collection over a network as well as internet radio and extras like Last FM and Napster.

Onkyo TX-NR609

Double bass player: Onkyo's TX-NR609

Onkyo's current range also adds Spotify as a big selling point. You'll need a Premium subscription but that also gives you access to its higher quality 320kbps bitrate. A wireless USB dongle (UWF-1) is available separately if you can't run a network cable into the back of the unit.

The newest in the brand's 600 series of mid-range receivers, the TX-NR609 has pleasing, minimalist styling and, unlike models lower in the range, it adds PC/console RGB video connectivity, the user-friendly Audyssey auto calibration, THX Select2 Plus certification and outputs for up to two subwoofers, in case you’re feeling ostentatious. There are six HDMI inputs with 3D compatibility, Audio Return Channel and a passthrough mode for one HDMI input when the receiver is in standby.

Its HDMI output carries 4K video upscaling, which unless you happen to run the local cinema, is beyond what most people need right now but it's reassuring to know it's capable of creating up to 2160 lines of vertical resolution. As it stands, its upscaling of video sources into conventional 1080p HD is well up to scratch.

Onkyo TX-NR609

Interfacing aplenty
Click for a larger image

A full complement of home cinema audio formats is supported, including Dolby TrueHD and DTS-HD Master Audio. There’s also Dolby Pro Logic IIz for taking stereo or basic surround sound and polishing it for multichannel listening. This is of course optional, as is Audyssey’s auto set-up and DSX processing, which purists might want to avoid (the manual set-up is relatively quick and easy too).

Onkyo TX-NR609

High performance access to file storage

Next page: Remote viewing

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.