Feeds

Reg Hardware trials gesture-controlled videogame

Look ma, no only hands!

Security for virtualized datacentres

MWC Register Hardware just tested gesture-based gaming technology. Our verdict? It rocks!

GestureTek_01

No need for a controller

Gesture-based technology works by tracking the movement of objects, such as faces or hands, and has already been integrated into several mobile phones, including Sony Ericsson’s F305.

At Mobile World Congress today, we caught up with GestureTek – the firm behind the technology – to test-drive a gesture-operated driving game.

There was no steering wheel and no buttons - in fact there wasn’t any form of controller. All we did was stand in front of “depth sensing” camera – a small, blue box below the TV screen – and hold out both arms as though gripping a steering wheel.

GestureTek_02

Move your fists further apart to speed the car up

Although initially terrible at the game, we quickly got the hang of it. Move your fists closer together to slow the car down or move them further apart to speed up. Hold your fists about three inches apart to put the car into reverse.

We hope the technology becomes more widely available soon. ®

Video
Hitachi highlights gesture-controlled HD TV - You are your own remote

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.