Feeds

Microsoft gets touchy with $24m N-trig investment

Feel the future

High performance access to file storage

Microsoft has joined a consortium of investors putting $24m into touch-screen and pen-based input specialist N-trig.

The company has partnered with Aurum Ventures, Challenger, Canaan Partners, and Evergreen Venture Partners to commit the money to N-trig, based in Israel.

N-trig said the funding would be used to continue its work with OEMs making multi-touch notebooks and convertible computers for the mainstream marketplace. N-trig touch-screen input technology has so-far been used in Hewlett-Packard's TouchSmart tx2 laptop and the Dell Latitude XT, and the company has promised more OEM design wins this year.

Microsoft ha long pushed the cause of stylus-based and tablet-style computers - a personal cause in particular of Bill Gates. The paradigm, though, has resolutely failed to take off and such devices remain the preserve of specific industrial sectors, like health and manufacturing.

With Windows 7, though, Microsoft is broadening the range of APIs available for use in touch-based input. The idea is actions in Windows and applications like Internet Explorer and Office executed using a mouse can also be done through touching the computer's screen once enabled by an ISV or OEM.

Windows 7 is unlikely to take Windows-based touch-screen input mainstream. It could, though, help take Windows deeper and into a large number of such specialized markets that do use tablets and touch but whose applications and devices do not currently support Windows. There's also the potential for greater use of Windows on hand-held consumer devices using touch for their input.

Microsoft said in a statement the combination of Windows 7 and N-trig's DuoSense pen and touch-based input technology would give customers a "brand new way" to interact with their PCs. "By simulating the way people write and touch naturally, N-trig is helping to make it easier to navigate your PC and enable a new class of Windows experiences," group program manager for Windows client Ian LeGrow said in a statement. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.