Feeds
70%
Acer T230H

Acer T230H multi-touch monitor

Point and flick?

  • alert
  • submit to reddit

Security for virtualized datacentres

Touch screens are hardly new, with many devices incorporating them with the simple mouse pointer control easily understood and used by applications. However, to take advantage of multi-touch, you’ll need software specially written to deal with more than one touch point at any given time.

Acer T230H

Windows 7's touch Qwerty keyboard login screen

If you’re running Windows 7 then there’s multi-touch support built into the operating system. So all you need to do is hook up the monitor and you can start using multi-touch features right away. For example, the built-in Windows Photo Viewer will allows pinch-to-zoom and two-finger rotate features, much as you would on an iPhone – though sadly without the smoothly animated rotation of the latter.

You also get to use the rather nice Windows on-screen keyboard and gesture-based controls for navigation. What’s more, when you’re using touch input, Windows 7 endeavours to make things easier for you by automatically adding in extra space in menus to help alleviate your fat-fingered fumblings.

Some third-party applications such as Corel’s Photo Studio 10, have incorporated multi-touch into the control interface, making good use of its capabilities throughout the suite. Yet, many older applications remain blissfully unaware of touch input devices, but Windows 7 has built in some legacy support for such programs allowing most of them to make use of the basic two-finger panning, zooming and flicking gestures.

The T230H supports two touch points, so you’ll be able to perform the essential multi-touch operations outlined above, but is doesn’t come close to palette of sophisticated many-fingered gestures supported by the Mac. That said, the T230H’s multi-touch features aren’t supported by the Mac at all.

Acer T230H

Plenty of input opportunities

Using the T230H to control Windows is sometimes a joy – the large text and controls found in Windows Media Center, for example, make it really quick and fun to use. However, it can occasionally be rather frustrating too often resulting in repeated failed attempts to drag and drop or select a particular screen element.

Protecting users from Firesheep and other Sidejacking attacks with SSL

Next page: Verdict

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Getting to the BOTTOM of the great office seating debate
Belay that toil, me hearty, and park your scurvy backside
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Lumia rebrand begins: Nokia's new UK web home is Microsoft.com
Yarr, them Nokia logos walking the plank and into the drink
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.