Feeds
70%
ikey_plus_tm

iKey Plus portable USB recorder

Connect iPod, press Record

Gartner critical capabilities for enterprise endpoint backup

Taking a tour around the iKey Plus, on the left side are the gold plated phono inputs, a 3.5mm mic socket, the record-level control and a three-position input selector. Switching this between the left and middle positions adjusts the iKey's phono input sensitivity to accept either a line-level source or "phonograph" - that's a record player to you and me. Conversely, switching it to the right sets up the mic input.

On the other side are the main on-off switch, DC power input, 3.5mm headphone socket, reset button and, of course, that all-important USB port for your storage device. Port layout is sensible, but because the phono sockets are now recessed, chunkier plugs usually found on high quality leads will not fit.

ikey_plus_ports

Making a recording with the iKey Plus is straightforward. After connecting it to an audio source and plugging in a suitable USB storage device, the first step is to set an appropriate record level. The decibel level of the input can be monitored - with or without headphones - using the five-LED VU meter display. Ideally, the level should be set so that it occasionally lights up the 0dB indicator. Any higher and the Overload LED will light up to warn of distortion. Next, choose the desired recording format and bit-rate by pressing the Select button until the relevant LED illuminates.

Once you're happy, press the Record button to start recording and again to stop. By repeatedly pressing the Select button while recording, the LEDs will display either the selected recording format, the decibel level of the audio input, or the amount of occupied storage space. Audio recordings are saved in the root directory of the USB drive or in the iPod's hidden Music folder. It's also worth noting that each file is respectively named and numbered according to the format and sequence in which it was recorded, eg. ikey_mp3_2. Before removing your USB storage device an eject procedure must be followed to avoid data corruption. This is done by holding down the record button for three seconds.

Boost IT visibility and business value

Next page: Verdict

More from The Register

next story
Kate Bush: Don't make me HAVE CONTACT with your iPHONE
Can't face sea of wobbling fondle implements. What happened to lighters, eh?
Apple takes blade to 13-inch MacBook Pro with Retina display
Shaves price, not screen on mid-2014 model
iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks
New plug not compatible with official Type-C, according to fresh rumors
The agony and ecstasy of SteamOS: WHERE ARE MY GAMES?
And yes it does need a fat HDD (or SSD, it's cool with either)
FEAST YOUR EYES: Samsung's Galaxy Alpha has an 'entirely new appearance'
Wow, it looks like nothing else on the market, for sure
YES YES YES! Apple patents mousy, pressure-sensing iVibrator
Fanbois prepare to experience the great Cupertin-O
Steve Jobs had BETTER BALLS than Atari, says Apple mouse designer
Xerox? Pff, not even in the same league as His Jobsiness
TV transport tech, part 1: From server to sofa at the touch of a button
You won't believe how much goes into today's telly tech
Apple analyst: fruity firm set to shift 75 million iPhones
We'll have some of whatever he's having please
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.