Feeds

Microsoft still just re-Surfacing Windows

Long-planned escape from beige boxes

Seven Steps to Software Security

Analysis Microsoft's announcement of Surface Computing, basically a PC built into a coffee table, might indeed represent a new paradigm in computing technology, but for Microsoft it's just another attempt at getting its software out from the beige boxes under our desks to somewhere, anywhere, else.

Microsoft long ago came to dominate beige boxes, so market expansion involves either getting more beige boxes out there, or getting Microsoft out of its self-imposed prison.

Leaps in development intended to make computers more friendly (and thus sell to a greater demographic) have gone badly: Microsoft Bob was widely derided as being resource-hungry and patronising, though only with Vista has his shadow finally been removed from Windows (in the form of the dog that accompanies the search dialogue in XP).

But it is Microsoft's attempts to escape from the PC entirely of which Surface Computing forms the most recent part.

Purple Dinosaurs

Back in 1998 we were treated to the story of Kayla Blau and her latest friend:

Seven-year-old Kayla Blau has a new second-best friend. She's smart, but not a show-off. Talkative, but not someone who hogs the conversation. Best of all, she likes a lot of the same activities that Kayla does, and she gives great hugs.

Kayla had fallen for an animatronic D W (children's TV character; Arthur's sister). These soft toys were launched by Microsoft in 1997 under the brand "Actimates", and responded to actions such as squeezing their hands or covering their eyes, and could interact with, and sing along to, TV shows.

The technology was based around an RF-transmitter module which picked up a special signal encoded with the broadcast or VHS recording. Several US TV shows broadcast the signal for a while, though the toys could also work with a PC running appropriate software.

D W came a year after the first "Actimate", Barney the dinosaur. The Teletubbies were slated for Actimate too, though only La-La and Po made it before the project died out.

Michael Newman, then of the Post-Gazette, pointed out just how terrifying Actimates could have become: "A fast-food chain, for instance, could use an interactive toy to promote its latest specials. It could even be programmed to yelp, beep, or otherwise make a ruckus whenever it passed near a restaurant."

Anyone with children can breathe easy that such a vision of the future never came to pass.

Compact audio cassette for Windows

Around the same time as Actimates, Microsoft launched its Auto PC, a computer that slotted into the dashboard of a car and featured everything the driver could want from Windows - early versions even featured a compact audio cassette player.

Mobile application security vulnerability report

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.