Feeds

Ten... celeb headphones

Big name sounds

High performance access to file storage

Product Round-up It's boom time for celebrity obsessed audiophiles. The headphone market explosion has seen everyone from 50 Cent to Earth, Wind and Fire slap their names on a pair, whether lending their names to existing products or getting involved in the production process.

The spiel accompanying each pair of headphones often makes a case for the cans being tuned for the kind of music produced by their sponsor. For the most part, that justification holds true. Hip-hop stars typically produce bass heavy headphones, while Lou Reed lent his name to a pair of Klipsch X10is, some of the most detail-reveailing headphones available. He didn’t change them at all, apart from making them purple of course...

Bob Marley Redemption Song Midnight

RH Numbers
RH Editor's Choice

Endorsed by the House of Marley, the wood and rainbow colours reflect the man himself just as the Marley biopic hits cinemas around the country. The stand-out sell here is the multi-coloured woven cable and wooden plated earbuds, guaranteed to get looks on the commute but offering superb build quality. Sound wise, they offer deep bass and a decent balance across all types of music. They might be bright and attention seeking but they offer some of the best sound against higher-priced rivals with a bigger celebrity price tag.

Bob Marley Redemption Song Midnight earphones
Reg Rating 90%
Price £70
More Info House of Marley

Dr Dre Beats Solo

RH Numbers
RH Recommended Medal

Great build and premium packaging out of the box, these on-ear headphones pin your ears with a tight plastic headband. The ear cushions themselves are soft enough to provide a decent listening environment but the sound veers towards bass and works best with rap, pop and dance music. The rugged inline cable and foldable headband make the Beats Solos good for commuting - and a winner in the style and design stakes - but the small cups do mean that there’s some sound leakage. There’s a choice of cables in the box too because the inline one won’t work with many phones beyond compatible versions of iPhone.

Dr Dre Beats Solo
Reg Rating 85%
Price £150
More Info Monster

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.