Feeds
70%

Violet Mir:ror DIY RFID kit

Attach the internet to objects. Apparently

  • alert
  • submit to reddit

Top three mobile application threats

Review Whether you notice it or not, radio-frequency identification (RFID) is upon us in our daily lives. For Londoners, the most obvious incarnation is the Oyster card. Sit it on a pad when you start and finish a tube journey and the fare is deducted from your account automatically.

The people at Violet want to make RFID a rather more fluffy experience by domesticating this technology with its range of cute looking ‘rabbit’ objects that also rely on a touchpad, called the Mir:ror, that hooks up with Mac, PC and even Linux boxes over USB. Internet access is also essential, to deliver what Violet describes as "The Internet of Things".

Violet Mir:ror

Violet's Mir:ror: everything is illuminated

Out of the box you get the Mir:ror, three Ztamps - postage stamp-sized stick-on RFID chips - and two Nano:ztags – plastic rabbits with moveable ears that do nothing other than add an element of body language to the proceedings.

The idea is that tagged objects or the rabbits can be assigned specific tasks. Wave them over the Mir:ror and anything from RSS headlines being read aloud, to streaming a favourite podcast channel are set in motion. Such are the basics of the Mir:ror, but there’s a whole ecosystem of possibilities that Violet is pioneering in order to realise its slogan, Let All Things Be Connected.

Violet Mir:ror

Put a tagged object on the pad to trigger an event

A flimsy quick-start guide gets things off the ground, the first task being to download the Mirware software. At version 0.9, it doesn’t inspire confidence. Once installed, a purple circle icon appears in the Mac menu bar and likewise on a PC’s Quick Launch area. If no Mir:ror is detected, the icon has a red X through it. Sometimes when the Mir:ror was connected but the application had to be quit and restarted, this disconnected state would appear, forcing us to unplug and replug the Mir:ror touchpad. A bit flaky really.

Combat fraud and increase customer satisfaction

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.