Feeds

DLO mix'n'matches iPod FM transmitter and remote control

Internet Security Threat Report 2014

DLO's TuneStik wwith Remote could be the in-car iPod accessory to top all others. The product combines a dock-on FM transmitter to beam your songs to your car stereo, and a radio remote you can clip to your steering wheel.

DLO TuneStik with Remote

So no more groping for your ipod to change channels and no need to install a price direct-to-stereo link either.

The TuneStik itself has a dock pass-through port, so you can still connect the iPod to a power source and/or other add-ons. And since a regular iPod can still be connected directly to a hi-fi or car cassette adaptor via the earphone socket, you're not limited to using the remote control to tune the FM transmitter.

DLO TuneStik with Remote

For in-car use, the TuneStik comes complete with a steering-wheel cradle for the remote control, so you can easily and safely navigate your iPod controls while driving.

The TuneStik and Remote is availble now for $60 from DLO's website and iPod retailers.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.