Feeds

Iogear touts anti-bacterial mouse

Clean up your desktop

High performance access to file storage

Iogear is gearing up for the new school season and aiming to clean up the desktop in one foul swoop. It has created a wireless mouse that not only claims to deliver optimal, err, scrolling in all situations, but which is also coated with a specialist anti-bacterial coating.

The Phaser 3-in-1 mouse apparently has a titanium dioxide and silver nano-particle compound coating, which its manufacturer claims kills bacteria enzymes and proteins on the device’s surface, so that users can be assured of a ‘cleaner’ mouse.

Iogear_mouse
The Iogear Phaser mouse: will it stun users?

It also incorporates a sort of thumb-operated tracker ball into its surface that allows users to pick the mouse up and use it as a crude remote control, for example during presentations. The mouse is compatible with both PCs and Macs, is plug n’ play compatible and works via USB 1.1 or 2.0. It operates over a 27MHz radio frequency and can be separated from its USB receiver and cradle by a respectable distance of up to 30 feet.

It also has a sensitivity level of between 800-1600 dots per inch, which is much lower than the likes of Razer’s Lachesis gaming mouse , but will do the job for business or school work. The Phaser 3-in-1 mouse is available now for around $60 (£30/€42).

Iogear has also developed a 4GB flash drive, dubbed The Wallet Drive, that, owing to its business card dimensions and 3mm thickness, is designed to be carted around at all times to provide storage as and when it’s required.

Iogear_wallet_storage
The Wallet Drive promises to provide handy storage

The drive also supports the established Windows ReadyBoost facility, which allows frequently accessed data and application code to be cached for quick access and to keep the hard drive powered down. It too works via USB 1.1 and 2.0, and is compatible with Sun OS – in addition to the usual suspects.

The Wallet Drive is also available now and ships for around $70 (£35/€47).

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.