Feeds

Cruciform MP3 player wins hearts of goths, god-rockers

Audio enlightenment

Choosing a cloud hosting partner with confidence

If you like music to have some religious significance, then the cross-shaped Keo player hits the nail on the head, so to speak.

Keo_MP_301_pic5

Keo MP-301: wear it around your neck to give religious beliefs an audio backing

The MP-301 has track selection buttons on either side of the cross, whilst the top section offers a menu button. The elongated down section of the player has a volume button and blue backlit display. A play button rests right in the centre of the cross.

There’s 1GB of storage built into the player and manufacturer Ice Tech claims the MP-301 will give around 12 hours' audio playback. After that, you'll need to recharge it over USB to bring it back from the dead.

Several audio formats are supported, including MP3 and WMA, whilst the player also functions as an FM radio and digital voice recorder. The player also displays text files, but Register Hardware thinks the screen may be a tad too small to easily read anything but the briefest of Biblical quotations.

Ice Tech’s cross-shaped MP-301 is available now for around $50 (£25/€32). A UK price hasn't yet been proclaimed from on high.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.