Feeds

Can't get a shag? Get nTAG!

Electronic aid for the socially awkward

  • alert
  • submit to reddit

Intelligent flash storage arrays

Hi my name's Bob and I'm socially inadequate

Do you have trouble interacting with members of the opposite sex? Do you find it hard to start conversations in social gatherings? Well, help may be at hand in the form of the ice-breaking

nTAG

.

The nTAG is something you hang round your neck like a conference badge. The devices talk to each other by infrared and are connected to a central server via radio. nTAG's website explains it all thus:

nTAG Interactive provides a complete event communications system for forward-thinking business and social gatherings. The system is built around our groundbreaking interactive name badge - the nTAG. nTAGs are wearable computers that improve networking among event participants while streamlining event management.

Yes, while nTAG is principally aimed at the corporate market, we gather it has recently been tested on several hundred unfortunates at a US technology conference. The nTAGs were programmed with personal details and alerted wearers when someone socially compatible came into range.

Which is tremendous news for those who really can't deal with the nitty-gritty of human interaction. We reckon it will be a boon for singles nights. Just programme in your wants and preferences, and wait for nTAG to alert you to the presence of a receptive potential partner. You wouldn't even need to speak - nTAG could do the whole thing for you:

  • nTAG 1: (Triggered by proximity to possible sexual match) Fancy a shag?

  • nTAG 2: (After analysing the wearer of nTAG 1's proclivities) Yeah ok.

  • nTAG 1: My place or yours?

The nTAG server then orders a minicab and alerts the event organisers so that the two lovebirds can't run off into the night without handing back their nTAGs.

And that, we believe, is the future for both the socially inadequate and nTAG. Why so for nTAG? What about the corporate possibilities? Well, we think that any sane person would have to held at gunpoint to induce them to carry an electronic device which, besides containing personal or other information which is transmitted wirelessly, can also be tracked by event organisers and makes the wearer look like a complete muppet. We could be wrong, of course. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.