Feeds

Is the pen mightier than the mouse?

Yes, says Sony boffin

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

A researcher at the Sony's Computer Science Laboratories in Tokyo has devised an ingenious way of transferring files from one PC to another without touching a mouse or keyboard. Using a pen-like device, users simply touch the file on screen that needs to be copied or moved, and then tap the monitor where the file is destined. Although it appears that the file has literally been "lifted" from one screen to another as if stuck to the end of the pen, in fact, the file has been transferred between the two PCs over the computer network. The system works by first "tagging" the file with the pen's identity code. When the pen is then tapped onto another screen the computer recognises the same code and moves or copies the last file that was touched to the new position. It's believed that the system could be especially useful for people such as stock market traders or TV editors who regularly use two or more computers, according to a report in New Scientist. The discovery came about after the inventive researcher became frustrated by the mess and confusion caused by having three PCs on his desk. I didn't know which mouse belonged to which PC, he said. The system is still in development and a commercial application is still some way off. With only three pen identification codes at present, Sony would have to develop many more for this to become practical for a large number of users over a network. The Register, though, can help. If you're faced with a similar problem, stop being greedy and try and offload a few PCs to people less endowed than yourself. If all else fails and you just have to have a desk cluttered with PCs, you could always colour-code your mouse and PCs. A low-tech solution but highly effective. ® Register jokoid: Assuming Sony's pen/network system takes off, would the administrator be a PenIS manager? Ahem.

Combat fraud and increase customer satisfaction

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.