Feeds

iSymphony tunes up Bluetooth wireless hi-fi

Security for virtualized datacentres

Will you please welcome iSymphony's latest music centre, a wall-mounted or shelf-stacked - the choice is yours - hi-fi that can connect to any Bluetooth device capable of streaming stereo sound wirelessly.

iSymphony V1BLUEe wireless music centre

The V1BLUEe packs in a CD player, an RDS-equipped FM tuner, a pair of 10W front-facing speakers and a 25W sub-woofer round the back. The unit has a USB port to allow you to hook up Flash drives, MP3 players and the like, and a three-in-one memory card reader lets it play songs stored on SD, MMC and Memory Stick cards. It'll even rip tracks to these storage devices.

But it's the Bluetooth A2DP (Advanced Audio Distribution Profile) support that stands out, allowing it to pick up wireless sound, and to control gadgets that support Bluetooth's AVRCP (Audio Video Remote Control Protocol) technology.

Phones, computers, wireless music players can all feed the V1BLUEe, which comes with a wireless iPod dock to allow that non-wireless player to stream songs to the hi-fi too. The system can also transmit to Bluetooth headphones.

The V1BLUEe is due to go on sale in July, iSymphony said, for around £250.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.