Solved

Internet radios - Hardware or software .... are software versions via a pc better?

Posted on 2007-03-19
1
188 Views
Last Modified: 2010-05-18
Internet radios - Hardware or software .... are software versions via a pc better?
0
Comment
Question by:worded
1 Comment
 
LVL 3

Accepted Solution

by:
jhoop2002 earned 500 total points
ID: 18758320
I'm a network administrator so no.  Internet radio just consumes my precious bandwidth, plus its one more thing to manage and secure.

In terms of quality, it depends on specific hardware you are looking at compared to specific hardware and software combinations.  Software is only as good as the hardware it runs on.  It also depends on where its going and what you want to do with.

So your answer really lies with the hardware your pc has and the source of your internet radio, compared to the hardware you are looking at and the source of your internet radio.  If the source is stereo, I don't care if your pc has 7.1 THX, your going to listen in stereo.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Last Mile Wireless The term last mile wireless is a bit deceptive as it can be much more than a mile. It is also called WiMax and 802.16. It generally refers to relatively short distance point-to-point / point-to-multipoint secure wireless connecti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question