Feeds

Electric shock game controller on the way

No pain no game

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

A game controller that gives you electric shocks is being developed by Mad Catz in the US. There isn't a press release and the office hasn't woken up yet (that's Californians for you) but the New Scientist has reported it, so it must be true.

Following on from the controllers that fight against you while playing (thus making it all far more involving), the prototype BioForce will give you electric shocks - ideal for fighting games, says a company spokesman.

Don't worry though, the shocks won't be enough to cause real physical pain (can you imagine the lawsuits if they did?). But it may be enough to cause a muscle spasm and make you lose grip of the controller.

"We like to describe it as a tingling low-power electrical stimulus," said the spokesman. D'you reckon he's been watching too many James Bond movies? "Stand by for World Domination."

How's it work? Well, you'll have to stick two electrode pads on your forearms (16 milliamp from three 1.5 volt batteries) and then whenever you character takes a punch (or kick) gazaam! up your arm. Sounds a bit disturbing but in a world where we're mollycoddled to the extent of legislation, we can see this being a great success.

Of course, for blokes it also introduces machismo ("I can take it, I can take it"). And the inevitable cheating by putting the electrodes on different parts of the arm or putting an insulator between the electrode and your skin.

Is it practical? Nah, not with the additional electrode thing. You really need the shock through your hand but then this will mess with the actual controller itself.

Mad Catz has so far connected the shock with the rumble mechanism in other controllers but it hopes to get people to write games especially for the controller.

We foresee heavy success and huge lawsuits in five years' time when ESI - a modern cousin of RSI - becomes the lawyers' favourite cause. ®

Related Link

New Scientist article

Related Stories

Canadian boy runs riot with chicken finger
US boy caged for drawing gun in class

Providing a secure and efficient Helpdesk

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
HBO shocks US pay TV world: We're down with OTT. Netflix says, 'Gee'
This affects every broadcaster, every cable guy
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
French 'terror law' declares WAR on the INTERNET itself, say digi-rights folks
Liberté, Égalité, Fraternité: Two out of three ain't bad
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
Google hauls Java-on-Android spat into US Supreme Court
If at first you partially succeed, try, try again
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
SCREW YOU, EU: BBC rolls out Right To Remember as Google deletes links
Not even Google can withstand the power of Auntie
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Redefining security for the cloud
Financial analysis, customer communications and long-term plans must be managed, secured and controlled to maintain your competitive advantage.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.