Feeds
80%

Aerielle i2i Stream 2.4GHz music streamer set

Wireless music streaming for dummies

  • alert
  • submit to reddit

SANS - Survey on application security programs

To start with, set up is simplicity itself. Once you've charged up both Stream modules you simply plug in the relevant audio cables, press the send key on one, the receive key on the other and the central channel key on both until they are showing the same colour.

Aerielle i2i Stream

Mini USB for charging

By way of a test, we used our Streams to turn a pair of Sennheiser HD 25 headphones into wireless cans and to send a signal from a stereo amplifier to some Edifier MP300 Plus powered speakers.

Using the headphones and a Sansa Fuze that we had in the office – loaded up with 256Kb/s MP3 files - we switched back and forth between a wireless and cable feed and frankly found it impossible to tell which signal was which.

With the headphone cord bundled up and the Stream dongle hanging around our neck from its lanyard we may have looked like a bit of a twerp, but we had great sound and could roam about at will.

Incidentally, i2i makes no mention of the Stream's audio power output, but it certainly drove our Sennheiser's all the way up to 11.

When we took a feed from a Cambridge Audio CD player and amplifier, the sound wasn't quite as good: it lost just a little in the way of warmth and tone, though a quick fiddle with the bass and treble controls on the amp got things back on track.

Aerielle i2i Stream

The Connection Doctor will see you now...

Using the Streams to send music from the same CD and amplifier combo to the Edifiers - now placed in the bathroom – we were again impressed by the reliability of the signal, the speed of set up and quality of the sound.

Combat fraud and increase customer satisfaction

Next page: Verdict

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.