Feeds
70%

Violet Mir:ror DIY RFID kit

Attach the internet to objects. Apparently

  • alert
  • submit to reddit

7 Elements of Radically Simple OS Migration

Voice messages are also possible from Violet.net by first configuring Flash’s Camera and Microphone Access. The Ztamp mailbox handles all these incoming messages but rather annoyingly, once the message is played it can’t be replayed. Sent images appear full screen when received but can’t seem to be saved.

In a way, it probably makes sense, as this approach to communication is somewhat frivolous. Given that anyone, even a non-Mir:ror user, can sign up for a Violet.net account and, when granted permission, communicate with a Mir:ror user’s objects, detritus could rapidly accumulate. Spam is even a possibility, which is why the site features blocking options.

As a concept, the Mir:ror did seem to imply that behaviour modifications were necessary to get the best out of it, but this was largely due to Violet over-hyping its offering's uses. Having watched the promo video on YouTube, the idea of waving a fish food container over the Mir:ror to know if you’d fed them, suggested users with memories akin to their cyprinid companions.

Violet Mir:ror

Nano:ztag: more colours than the iPod Nano line-up

Verdict

The communication aspects will no doubt appeal to the socially anorexic because, in the end, it’s all about being tied to a computer to be notified of things that might be better experienced in real time using the phone, which is rather more mobile and can also receive messages. Still, the Mir:ror can be useful in accessing applications or information quickly, and it’s not too pricey either. It’s just a shame the software is so half-baked in places.

So if you’re alarmed when your nearest and dearest says she’s going to buy a rabbit to help with the daily grind, take heart - it’s highly likely she’ll need your help to use it in front of the Mir:ror. ®

More Gadget Reviews...


Movu Minoru

Sony Rolly

WowWee Rovio

Vuzix iWear AV230 XL

Build a business case: developing custom apps

70%

Violet Mir:ror DIY RFID kit

A quirky concept. The software needs modifying and possibly your lifestyle too...
Price: £45. Extra Ztamps: £17.90 for 12 RRP

More from The Register

next story
Nice computers don’t need to go to the toilet, says Barclays
Bad computers might ask if you are Sarah Connor
4K video on terrestrial TV? Not if the WRC shares frequencies to mobiles
Have your say with Ofcom now, before Freeview becomes Feeview
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
YES, iPhones ARE getting slower with each new release of iOS
Old hardware doesn't get any faster with new software
You didn't get the MeMO? Asus Pad 7 Android tab is ... not bad
Really, er, stands out among cheapie 7-inchers
Apple winks at parents: C'mon, get your kid a tweaked Macbook Pro
Cheapest models given new processors, more RAM
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Microsoft stands on shore as tablet-laden boat sails away
Brit buyers still not falling for Windows' charms
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?