EDTV vs HDTV

Confused by EDTV vs HDTV? We don't blame you. The number of acronyms floating about with regard to digital TV is frightening. What's even more worrying is that very often they are used by people who have little or no knowledge about what they mean. If the person selling you doesn't know the difference between EDTV vs HDTV, how are customers supposed to decide which TV or projector to go for?

In our guide below, we've tried to distill the technical info into as few words as possible and make it as straightforward to understand as we can.

To properly explain EDTV vs HDTV, we need to step back a bit. Traditional TV has 525 lines of video which are interlaced. Interlacing just means that every frame of video is split into two fields and each field is shown alternately. Although there are 525 lines in the signal, only 480 lines contain video, so it is sometimes referred to as 480i (480 lines interlaced). This is known as Standard Definition TV, or SDTV. While this has worked well enough for fifty years, as TV sets have got bigger and projectors more popular, the quality deficiencies have become increasingly apparent.

The ultimate answer to improving the quality of the image displayed on your TV is hdtv, however, as a step on the road to HDTV, the industry came up with Enhanced Definition TV, or EDTV. This system contains the same 480 lines as SDTV, but they are progressive scan. Hence EDTV is also known as 480p. Progressive scanning just means that instead of splitting the signal into two fields and showing half the lines at a time, all 480 lines of video are shown at once. This results in a noticeable improvement in the quality of video.

The bad news in relation to EDTV vs HDTV is that you need a completely new TV or projector to display both EDTV and HDTV. Most DVD players on the market today are progressive scan, meaning they output EDTV signals, however, in order to view the progressive scan picture in all its glory, you need a TV or projector capable of displaying it and that, unfortunately, means getting a new TV.

In terms of content, there is very limited TV content available in HDTV format, and there is still wrangling about the standard for HD DVDs. However, every DVD disc on the market can be displayed in EDTV right now.

Bottom line? Pretty much every HDTV projector or TV on the market today will display EDTV as well. So even if you live in a country or area where HDTV content is limited or non-existent, it is worth it to watch your DVD collection in EDTV, the difference between SDTV and EDTV really is that big.

Kenny Hemphill is the editor and publisher of hdtv - a guide to the kit, the technology and the programming on HDTV.

tidy up service Glenview ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

The Many Benefits of Owning a DVR

Has This Ever Happened To You? OK.. it's Friday night,... Read More

Digital Cameras Ratings Abolish Camera Comparison Guesswork

Digital cameras ratings are great tools for deciding which camera... Read More

Some Thoughts on Choosing a Flash MP3 Player

Flash mp3 players come with an exciting array of features,... Read More

Cut Through the Hype and Make the Right Digital Camera Comparisons

There are soooo many choices. With all the styles and... Read More

Back Up, Back Up, Back Up!

This is not your typical lost data story. I was... Read More

How To Increase Computer Speed And Performance - Great Tips & Tricks

Many computer users are worried about their computer's performance. After... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

404 Error Pages: What Are They And How Do You Create One?

We've all seen them, you've been browsing a website and... Read More

How To Have Two (Multiple) Copies Of Windows

Having two operating systems is not as difficult as many... Read More

Ergonomics and Healthy Computing - Positioning Your Body For Maximum Comfort At Your Computer

Do you remember the old saw about how computers would... Read More

Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix... Read More

Registry Tools Demystified

Not sure what Windows registry is or how it works?... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Lightning Season: How to Avoid Data Loss

We have just entered the time of year that most... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Get Ahead When You Build Your Own Computer

If you've been kicking around the idea of building your... Read More

How To Become A True CCNA

I've worked my way from the CCNA to the CCIE,... Read More

iPod - Learn How It Can Solve Everyday Problems

All over the world, people carry with them walkmans and... Read More

How To Recognize The Telltale Signs Of Spyware

Spyware is the software that collects information about your online... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

If You are the Only User on Your Windows XP Computer, Do You Think One User Account Is Enough?

I am going to assume that you are running windows... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

maid service near Winnetka ..