Feeds

Handwrite onto your BlackBerry

You want me to sign where?

Choosing a cloud hosting partner with confidence

BlackBerry Pearl users can now transfer handwritten notes into their handhelds using a digital pen and paper. The technology is aimed at uses such as form-filling - write on the form, tick a box and the written data is sent first to the BlackBerry's screen for you to check, and then back to base over the mobile network.

It uses Anoto digital writing technology, which overlays the paper - a blank sheet or a printed form - with a unique dot pattern that's picked up by a camera in the tip of the pen. The pen records only the marks you make, which are then superimposed on a digital copy of the form to re-create your complete page.

According to Destiny Wireless, which developed the routing software that enables the smart phone to collect data from the pen over Bluetooth and then forward it for processing, handwriting now works with several BlackBerrys, including the Pearl and 8800. The company already has similar software for Symbian, Windows Mobile and Java-capable handsets.

Destiny's CEO, Edward Belgeonne, said that although many businesses have eagerly adopted BlackBerry for its messaging capabilities, there's a whole range of needs that it cannot answer. In particular, he said, "They may need to capture customer signatures to validate work, or find that they are restricted in how much data they can send from the field."

He added that the routing software also allows users to attach photos to a form before sending it off. If there is no network coverage, captured data is buffered on the smartphone and sent once the connection comes back up. ®

Intelligent flash storage arrays

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Ofcom tackles complaint over Premier League footie TV rights
Virgin Media: UK fans pay the most for the fewest matches
FCC: Gonna need y'all to cough up $1.5bn to put broadband in schools
Kids need more fiber, says Wheeler, and you'll pay for it
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.