User's Manual

downloaded and saved recordings, or explore your computer to find
other WAV files for playing.
2.) Double-click on the WAV file you wish to playback. The name
of the file will appear in the box to the left of the BROWSE
button.
3.) There are three controls on the Player:
> - select for PLAY, de-select for STOP
|| - select for PAUSE, de-select for CONTINUE
|<< - select for REWIND TO BEGINNING
NOTE: A single downloaded file, or the last downloaded file in a
list, is automatically selected for playback.
Clearing the memory of the Joey
Once all required files have been downloaded, use the "Format"
button to clear the entire recorder.
NOTE: Individual recordings cannot be erased.
WARNING: BE SURE YOU HAVE DOWNLOADED ALL
IMPORTANT FILES BEFORE USING THE FORMAT COM-
MAND. THIS COMMAND IS NOT REVERSIBLE.
Closing the Whisper Player Software
Press the DONE button to close the software.
File Integrity
To ensure validity of the recorded data sets and to safeguard
continuity of evidence, the Joey Recorder implements a number
of integrity checks.
1) Each Joey Recorder is given a unique UNIT ID at the time of
manufacture. The UNIT ID cannot be changed by the user.
2) Every recording made by the Joey is given a unique FILE
NUMBER. The FILE NUMBER is generated by the Joey and
cannot be nominated by the user.
3) Recordings are made from blocks of data. Blocks are totally
self-contained and represent between 0.05 and 0.1 seconds of
speech, depending on "Sample Rate" and "Format" settings.
Consisting of 528 bytes, the block contains a 512 byte "data
packet" and a 16 byte "header packet". Each block is given a
count or SEQUENCE NUMBER, starting at 1 for the first block
of each recording, and contains a CHECKSUM for the "data
packet" and a checksum of the individual packet CHECKSUMS.
Each and every "header packet" also contains the UNIT ID and
FILE NUMBER.
Thus each 0.05 to 0.1 seconds of recorded sound packets can be
shown to have a valid checksum, belong to a unique recording on
a unique device and be in sequence with its neighbours. The
second CHECKSUM of the packet CHECKSUMS further
validates the integrity of the data. If a corruption occurs or
integrity fails the exact time and span of the dubious data can be