Feeds
90%

Logitech Wireless Headphones for iPod

Bluteooth ends tangled earphone cable misery?

3 Big data security analytics techniques

Review Logitech's wireless headphone set is more iPod-specific than the company's Wireless Music System (WMS), which Reg Hardware reviewed last week, though the underlying technology is the same: Bluetooth with its optional Advanced Audio Distribution Profile (A2DP) protocol to allow stereo music to be beamed from a compact transmitter to the 'phones...

logitech wireless headphones for ipod

This time round, Logitech ships a version of its plug-on transmitter with an integrated remote-control connector slot. Beyond that it's the same unit as before: there's a built-in rechargeable battery fed by a proprietary connector, and the same slider mechanism that allows you to place the 3.5mm earphone jack centrally or out to the edge of the box, the better to match the position of the 'phones socket on your iPod.

There's the same battery preserving auto-shutdown feature that kicks in when the transmitter notices no electrical activity on the 3.5mm jack. And, alas, the same tiny connect button that so soft that half the time you're not sure you're pressing it.

The presence of the remote control connector limits the product to iPod Minis, and third and fourth-generation iPods and their derivatives. Actually, you can fit it directly to a Nano or a Shuffle too, but they end up at right-angles to the transmitter so it's not exactly an ideal marriage. Logitech bundles a short, 23cm (9in) 3.5mm jack extension cable so you can connect the transmitter to other MP3 players and iPods. And, let's face it, since wireless means you can tuck the player and transmitter out of sight in a bag or pocket, it doesn't matter what the coupling looks like, only how well it works.

However, using anything other than the chosen iPods - and that includes a TV, DVD player, hi-fi amplifier, PlayStation, Xbox, whatever - you won't get to control playback. I don't know about you, but when I'm out and about, I find I spend far more time adjusting the volume - which you can control not matter what your music source - than I do skipping tracks and pausing, so not having the other controls wouldn't bother me much.

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.