Would I find it of use ... and what are those 2 little pins ?

Hi all ... in the photographs of the AE there are 2 pins poking out from the top end of the unit facing away from the camera ... is this a US telephone connection ? and if so what does the UK AE come with ? Where does it get it's power from ?
I have a wireless router (Netgear) which reaches far enough around the house for my PB and I'm not too fussed about the imusic playout facility so would the AE be of any use to me (I thought I could take it to Spain in the summer as the hotel we go to only has a telephone socket in the reception area ... so maybe I could plug the AE into that (it will exclude other users from that socket though)!
Sorry this is going on a bit ... I'll shut up now .... thanks for your time ... Roger

No problems Roger - but Ive slightly shortchanged you with my answer by implying that you can only use it in a hotel in Spain if they have wireless.
Of course if the hotel has wireless internet, then you would actually just use the Airport Card in your laptop to access their network.
The reason for having the Airport Express is if they don't have wireless.If the hotel provides broadband internet access via an ethernet cable in your room, you can plug their ethernet cable into your Express and then the Express into the electical outlet and have your own wireless network running.
The advantage with this is being able to have your PB where you like in the room and not stuck in the corner of the room with cabling a foot long.
Cheers
Wynter
iBook G4   Mac OS X (10.4)  

Similar Messages

  • How To Handle Tickets and What are those

    Hi Everybody,
    Can anybody tell me, How to handle tickets and what are those.
    srinivas

    Hi,
    Tickets are basically assocaited with Production support type of work.
    Tickets are nothing but the medium through which problems reported either in the system or by users to the Production support team.
    There are certain problem management tools that every organization uses (tickets are created and worked on using those tools). There are tools like Vantive, Remedy, CASE, etc.
    Usually the helpdesk gets the first contact for any user problems and then they log a ticket with the appropriate support teams. The support teams then pick up those tickets and work on them till they are resolved. There are tickets created for user problems or any batch job failures, system failures, etc.
    Tickets are usually classified as Critical, High or Low and again they are categorized as High Severity, Medium Severity or Low Severity. All these types of tickets have SLAs (Service level agreements) for the Support teams to respond and the resolve the tickets in.
    Look at the threads below for similar posts :
    tickets
    Tickets
    tickets
    Cheers,
    Kedar

  • What are those darn little blue boxes with

    question marks? How do I get rid of them.
    Thanks

    I just means the image could not be loaded. Maybe the server the image hosted is down, the URL to the image is not correct, or the browser timed out trying to load the image.
    Only thing you can do about it is notify the webmaster and they will hopefully look into it.

  • What are the two little flip out "legs" on the charger?

    What are those funny little "legs" that flip out from two corners of the charger?
    Also, do you only use the charger to re-charge the battery?
    If you use the AC cord (plugged into the charger, and then into the computer) is the battery charging while you are using the computer?
    Thanks in advance for your help.
    Joe

    The legs are so you can wind the adapter cord around to help store i without so much mess.

  • My iPhone was stolen and I have contacted the police who are using the meid number to locate.  How does this work and what are my chances of getting the phone back?

    My iPhone was stolen.  I used Find My iPhone app to lock it and display a message.  The phone has not connected to the internet to locate it.  I contacted the police and they have taken my meid number.  How does this work and what are my chances of getting the phone back?  Are there other ways the theif can use it.  I was told once they put in a new sim card and use it, whatever software the police have, it will show up.

    Honestly? In the US (I can't speak to other countries, though I doubt it works much differently in a lot of the world) The police took your report and filed it either in their computers or, on paper. They will now not think of this again. The only time it will cross anyones mind is if, in the course of entering information into evidence about items recovered or seized at a crime scene, the serial number of an iPhone that was found/seized happens to match yours, in which case you will be contacted.
    The police in the US can and will do nothing to 'blok' the phone and it's not worth their time to try and locate it unless you know for a fact that it was stolen by a big time drug lord, master criminal, or some other such prime target and they can get a court order to track the location of the phone in order to locate this individual for your own purposes.  If they do that, they'll probably keep him under surveilance for a year or so before they act.
    Basically, the police don't care about your phone. If they find it, they will give it back to you. They are not, however, going to go looking for it. They have better things to do.
    I'm sorry, but that's the way it is.

  • What type of generic delta to use and what field?

    Dear BW Gurus,
    I am creating a generic datasource based on a view BSAK and BSIK (Accounts Payable tables). I am not able to determine what type of generic delta (numeric pointer, calender day or timestamp) should i use and what field in the table should it that be based on? All or any help is greatly appreciated.
    Thanks
    Raj

    CALDAY on field BLDAT (in both tables) seem an obvious candidate.
    Added - You will need help from functional people (or you can try it in ABAP forum) to determine which date field is updated with the system date when these tables are updated with SAP txns (some hint can be had by looking at the data)- the fields of interest would be -
    BUDAT
    BLDAT
    CPUDT
    It is almost certain that CALDAY is the only option you have for delta type, and one of these three fields will have to be chosen.
    Message was edited by: Ajay Das

  • BVI - What is it and what are its uses?

    BVI - What is that and what are its uses?

    Ranji,
    A BVI is in fact quite similar to an SVI (interface Vlan). You can define a software bridging between various ports of a router, similar to switching between various ports on a switch. If the ports on a switch belong to the same VLAN and the switch is capable of multilayer switching, you can create an interface Vlan for that VLAN and allow the hosts in that VLAN to use the IP address of the interface Vlan as their default gateway.
    The same goes for interface BVI - Bridged Virtual Interface. When configuring software bridging, you define a group of interfaces that are bridged - the router performs bridging (i.e. software-based switching) of frames between all member ports of a bridge group, in essence forming a single broadcast domain - an IP subnet. If the devices in the common bridge group want to access other IP networks, they need a gateway, so you create an associated interface BVI that is also a part of the bridge group, and devices in the bridge group then use the IP address of the BVI interface as their gateway.
    For exampe, imagine a router with two FastEthernet interfaces:
    bridge irb!interface FastEthernet0/0 no ip address no shutdown bridge-group 1!interface FastEthernet0/1 no ip address no shutdown bridge-group 1!interface BVI1 ip address 10.0.0.1 255.255.255.0 no shutdown!bridge 1 route ip
    This configuration would make your router to basically behave as a 2-port "switch" on its Fa0/0 and Fa0/1 interfaces, and devices connected to these ports would use the 10.0.0.1 as their default gateway to other networks.
    You rarely configure bridging exactly this way these days, as switches are orders of magnitude faster and have way more ports. Still, there are situations where you need to bridge two interfaces, taking packets out of frames of one technology and putting them into frames of a different technology, without routing them, just repackaging but still carrying them between interfaces. This is often done in, say, DSL if the router is configured to act in bridge mode - take IP packets coming to Ethernet interface and simply repackage them into PPP or ATM+AAL5 cells on the DSL WAN port (and vice versa).
    Best regards,
    Peter

  • What are Wrapper classes and what are they used for ?

    What are Wrappter classes and what are they used for ?..Also, any examples would be great to understand this concept

    Wrapper classes are used to enclose primitive data
    types so that they can be used in instances where an
    object is required. For example, if you want to add an
    integer to an ArrayList, you can't use this:java.util.List al = new ArrayList();
    int i=123;
    al.add(i);because the ArrayList expects data of type object. In
    order to all the integer to the ArrayList, you must wrap
    it in the Integer wrapper class. This works:java.util.List al = new ArrayList();
    int i=123;
    al.add(new Integer(i));Hope that helps.
    Mark

  • Why do iPhones/iPad not support Flash Player/Java and what are my alternatives for browsing sites using these plug-ins?

    Why do iPhones/iPad not support Flash Player/Java and what are my alternatives for browsing sites using these plug-ins?

    There are also iSwifter, Photon, Skyfire, etc., some only support Flash some support Java and Flash.
    Adobe never made a version of Flash for iOS and closed their mobile flash division a couple of years ago. You can get Flash on other personal devices but you will be using a 2 year old version that has not been patched for security vulnerabilities.
    When the original iPhone was released Mr. Jobs said it would never run Java as it was old technology and a security risk. Nothing has changed since.

  • I got a text message which had a link attached to it, i did click on the link, basically some job scam but on the link. Now i just want to find out if my phone has been compromised in anyway and what are the tell tell signs.

    I got a text message which had a link attached to it, i did click on the link, basically some job scam but on the link. Now i just want to find out if my phone has been compromised in anyway and what are the tell tell signs.

    your phone has not been compromised.  There have been no viruses, worms or trojan horses ever reported.

  • I have stored everything on my Macbook pro in a external hard drive (Time Machine)  Now that we have "wiped the machine" I am told I can start it over and load ontent--apps, docs, etc from the hard drive, just plug it in, find the time machine and what?

    I have stored everything on my Macbook pro in a external hard drive (Time Machine)  Now that we have "wiped the machine" I am told I can start it over and load ontent--apps, docs, etc from the hard drive, just plug it in, find the time machine and what?    I need to know what to highligh, what to click on. 

    hirogliffix,
    take a look at this Apple page — in particular, the “Restoring data from Time Machine backups” section and its “Restoring your entire system from a backup” subsection.

  • What are these and what are they useful for?: and

    I have seen these symbols being used in Java: << and >>, what are they and what do they do?
    Thank you.

    As DrQuincy asks how is this of use over multiplying
    and dividing?In your processor there are often different instructions for shifting, multiplying, and deleteing. Typically the shifting instructions take less time to execute and so using the shifting operator will be faster than multiplying. This assumes the compiler doesn't recognize the situation and optimize it out though.
    The >>,<<,>>>, &,|,and ^ operators are mainly useful when you need to deal with individual bits of data. For instance if you are talking to another system (thats not java) that uses a different method of storing numbers (little endian/big endian etc.), or doing something such as creating parity data for error correction. There are lots of things to do, but most a low level and its rare when you need to use them.

  • I am freeing up some space and am using osx lion, but i have 12gb of back ups, how can i delete these and what are they?

    I am freeing up some space and am using osx lion, but i have 12gb of back ups, how can i delete these and what are they?

    Gotcha.
    Back-ups are what they are: a safety copy. If you feel you don't need them, you can trash them. They could be of a previous System if you upgraded, or something else. You wont get the full picture from looking at system profiler.
    You may want to look into getting an external drive and offloading some stuff to it.

  • How to use Smart cut and what are the restrictions to use this

    Hello,
    How to use Smartcut and what are the restrictions to use this.
    is it possible in version 9.
    and is it safer to use it in real iproject mplementation?
    Thanks in advance

    Hi
    read more about smartcuts here http://download.oracle.com/docs/cd/E12825_01/epm.111/bpmui_admin.pdf
    read "Managing smartcuts"
    Regards
    alexander

  • What are the frequencies all versions of the iPhone 6 and what are they used for (e.g. GSM, 3G, LTE, WIFI, Bluetooth,etc...) provided with channel numbers per frequency

    what are the frequencies all versions of the iPhone 6 and what are they used for (e.g. GSM, 3G, LTE, WIFI, Bluetooth,etc...) provided with channel numbers per frequency.

    Click here

Maybe you are looking for