Feeds

SplashPower splashes down in Fulton Innovation

Consolidating the drips for induction charging

High performance access to file storage

SplashPower, the UK inductive charging company that has been struggling to create a product since 2001, has been bought up by Alticor-subsidiary Fulton Innovation.

SplashPower went into administration last month, having failed to secure more funding, and Fulton purchased the assets from the administrators. Fulton is also in the inductive charging business as the exclusive licensor of eCoupled technology, though it is also at the impressive-demonstration stage of development.

Inductive charging, as used in electric toothbrushes, makes for good proof-of-concept demonstrations, and the idea of being able to drop a device onto a mousemat-sized platform and have it charged wirelessly is attractive. SplashPower's idea was to get its technology incorporated into mobile phones, PDAs and the like, so every device could use the same pad. Given that device manufacturers can't agree on a single plug design or even a charging voltage, it was optimistic that they were going to all agree to license the Cambridge-based company's technology, cool as it was.

Slightly more practical, though less cool, is WildCharge, which achieves the same effect with a replacement case featuring embedded contacts - wireless, if not contactless.

Fulton seems more interested in the patents owned by SplashPower than its employees or existing business. "Combining our own robust patent portfolio with Splashpower's, we continue to strengthen and expand our capabilities in the development of wireless power," said director of advanced technologies for Fulton Innovation Dave Baarman in a statement. The company hasn't yet responded to our request for more information on its plans for SplashPower.

If manufacturers do all adopt USB as the preferred charging solution - and a recent edict from the Chinese government should drive them in that direction - then the plethora of chargers and plugs disappears from desks anyway, leaving SplashPower with even less of a problem to solve. Fulton Innovation seem to have a broader approach to utilising wireless charging, but a wireless grill hardly seems to be the killer app for the technology. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.