Feeds
80%

Aerielle i2i Stream 2.4GHz music streamer set

Wireless music streaming for dummies

  • alert
  • submit to reddit

3 Big data security analytics techniques

To start with, set up is simplicity itself. Once you've charged up both Stream modules you simply plug in the relevant audio cables, press the send key on one, the receive key on the other and the central channel key on both until they are showing the same colour.

Aerielle i2i Stream

Mini USB for charging

By way of a test, we used our Streams to turn a pair of Sennheiser HD 25 headphones into wireless cans and to send a signal from a stereo amplifier to some Edifier MP300 Plus powered speakers.

Using the headphones and a Sansa Fuze that we had in the office – loaded up with 256Kb/s MP3 files - we switched back and forth between a wireless and cable feed and frankly found it impossible to tell which signal was which.

With the headphone cord bundled up and the Stream dongle hanging around our neck from its lanyard we may have looked like a bit of a twerp, but we had great sound and could roam about at will.

Incidentally, i2i makes no mention of the Stream's audio power output, but it certainly drove our Sennheiser's all the way up to 11.

When we took a feed from a Cambridge Audio CD player and amplifier, the sound wasn't quite as good: it lost just a little in the way of warmth and tone, though a quick fiddle with the bass and treble controls on the amp got things back on track.

Aerielle i2i Stream

The Connection Doctor will see you now...

Using the Streams to send music from the same CD and amplifier combo to the Edifiers - now placed in the bathroom – we were again impressed by the reliability of the signal, the speed of set up and quality of the sound.

SANS - Survey on application security programs

Next page: Verdict

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.