Feeds
85%
iDapt i4

iDapt i4 multi-purpose charger

Does 'em all, apparently

  • alert
  • submit to reddit

High performance access to file storage

Review Charging cables inevitably get knotted, misplaced or mistaken, yet appear a necessary evil to keep mobile devices going. So many proprietary connections are in circulation nowadays and, with most people owning at least two devices, cables soon become a mess and families fight over plug sockets.

iDapt i4

On multiple charges: iDapt's i4

The iDapt i4 charging dock offers some respite from this situation. With self-regulating power outputs and the ability to simultaneously charge up to four devices, it features an interchangeable tip system, with plentiful options.

A pack of six standard tips are supplied: iPhone/iPod, miniUSB, microUSB and recent Sony Ericsson, Samsung and Nokia adapters. A further 16 tips are available and customers can opt upon purchase for their custom choice of four rather than the standard six. Bought separately, the tips cost £6 each, so it’s worth getting the ones you need in the first place. And they’re not all for phones either, there’s one tip that houses a couple of AA/AAA rechargeable batteries.

The hub unit accommodates three tips – two at the back and one at the front. With each port having a button either side to release each tip, detachment from the hub from accidental knocks is extremely unlikely. In place, the tips protrude from the hub with LED status lights next to each that glow red when a device is on charge and, you guessed it, green when not.

Unfortunately, when power is on, these lights are always green, so if your device is nudged and breaks the connection, it’ll probably look like it’s fully replenished.

iDapt i4

The side USB port can charge other devices, with the right cable, of course

Also, for those with more obscure mobile devices, a USB port on the side allows you to hook up other gear. This port lacks the audio-visual charge notifications of the main adapters, so you’ll have to rely on your device to tell you how charged it is. In tests, the standard pack of tips only covered half of my devices, so the USB port was used frequently, but due to cable use, appears no different to using a port on your laptop. That said, given the iDapt i4’s 13W total output, it knocks out a bit more juice than a typical PC port.

iDapt i4

High performance access to file storage

Next page: Bung hole surfer

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.