Feeds

Kensington dangles iPod Shuffle dock dongle

Access a world of accessories

Choosing a cloud hosting partner with confidence

Last week we told you about a neat new adaptor that allows iPod Nano users to connect a host of older iPod accessories to their slimline music player. Now, thanks to Kensington - better known for its ubiquitous notebook lock port - so too can Shuffle owners.

kensington ipod shuffle dock adaptor

Yes, Kensington's appropriately named Shuffle Accessory Adapter finally brings the standard iPod dock connector to the diminutive, screenless device. It's dead simple: the adaptor box has a USB socket on one end and a dock connector on the other.

There's a slight catch: Kensington admits the adaptor doesn't work with accessories that control the iPod - for example, Kensington's own Stereo Dock, which incorporates a remote control - but anything that simply responds to an outgoing control signals and to music, such as FM transmitters, should work just fine.

And, at £15 in the UK or $20 in the US, it's a snip. ®

Recent reviews

Logitech Wireless Headphones for iPod
Logitech Wireless Music System for iPod

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.