Feeds
60%
Cool-er eBook Reader

Interead Cool-er

Reading: the future?

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Review The time of the eBook reader may have come at last. With Amazon’s Kindle leading the charge and Barnes and Noble working with UK OLED display maker Plastic Logic for a similar offering next year, there’s growing awareness of the possible market for electronic readers. Interead’s Cool-er is an independent reader, trying to carve itself a niche.

Cool-er eBook Reader

Interead’s Cool-er: another page in the eBook’s development

There’s undoubtedly more interest in eBook readers than there was even a few months ago and the Cool-er device from Interead aims to service a slice of this. Styled like a large iPod and in a range of candy colours, the cases are disappointingly plastic and there’s no slip-sleeve to protect case or 6in E-Ink display.

E-Ink is probably the best know supplier of electrophoretic screens and is used by Sony and Amazon. The big advantages are that the screen has high contrast – though the background isn’t completely white – and that it takes no power to maintain an image; in this case, a book page. The only power is taken when the page is turned and the screen refreshed.

The Cool-er has a set of buttons down its left-hand edge for sound, orientation, exit and menu and a toggle button on the right for sound volume. On the front panel, below the screen, is a ring of navigation buttons and a central one to make a selection. All the buttons are too stiff to be comfortable, but in their favour, are also hard to press in error.

Cool-er eBook Reader

There’s no denying the high contrast of the E-Ink screens

The reader uses a Linux variant as its OS and runs the Adobe Mobile Reader. It shows folders and files for eBooks you’ve loaded from the Coolerbooks site, where there are over 300,000 titles available, plus another million free, public domain, ones. Contemporary fiction eBooks tend to be more expensive than from Amazon, but at least when you buy one, it’s yours and there’s no mechanism, as there is in the Kindle, for anyone to delete it from your Cool-er.

Beginner's guide to SSL certificates

More from The Register

next story
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
Don't wait for that big iPad, order a NEXUS 9 instead, industry little bird says
Google said to debut next big slab, Android L ahead of Apple event
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Netscape Navigator - the browser that started it all - turns 20
It was 20 years ago today, Marc Andreeesen taught the band to play
A drone of one's own: Reg buyers' guide for UAV fanciers
Hardware: Check. Software: Huh? Licence: Licence...?
The Apple launch AS IT HAPPENED: Totally SERIOUS coverage, not for haters
Fandroids, Windows Phone fringe-oids – you wouldn't understand
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.