Feeds

Nano-friendly Bluetooth stereo adaptor in pipeline

iPod powered

Remote control for virtualized desktops

German Bluetooth accessory specialist AnyCom is preparing a wireless stereo audio adaptor for Apple's iPod Nano. The slimline add-on draws its power from the player to beam out songs using the Bluetooth 1.2's Advanced Audio Distribution Profile (A2DP).

The unit - dubbed the BluNa - plugs onto the bottom of the Nano, connecting to the player's Dock port. The adaptor also supports the Bluetooth Audio Video Remote Control Profile (AVRCP), so you can use any compatible headphones to control the player directly.

anycom bluna ipod nano bluetooth stereo adaptor

AnyCom claims the 10g unit has a 10m range. It admits use of the BluNa reduces the iPod's single-charge playback time by two and a half hours, so you should still get over 11 hours' usage out of it. AnyCom said it will bundle an AC adaptor with the BluNa, allowing the player to be recharged while it's connected to the Bluetooth device.

There's no world yet on pricing or availability - the AnyCom website simply says the BluNa is coming "soon". It'll be available in black and white versions. ®

Remote control for virtualized desktops

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.