Feeds

Lenovo eyes peeper-pursuing PC controller

From mouse balls to eyeballs

Choosing a cloud hosting partner with confidence

Do I spy with my little eye, something beginning with IT? Lenovo has redesigned the personal computer interfacing system and debuted the world's first laptop with integrated eye control.

Yes, users can point, select and scroll, as well as zoom-in and browse webpages, simply by moving their eyeballs, apparently.

The company has built 20 fully-functional laptops using eye-tracking tech from Swedish manufacturer Tobii Technology.

Two infra-red sources bounce invisible light off the user's retinas. The reflected light is picked up by two cameras and the data used to calculate exactly where the user is looking.

Track the position over time and you can map out eye movements as gestures, just as you'd track a user's finger moving over a trackpad.

The prototypes are on display at this year's CeBit trade show in Hannover, Germany, and while the technology is still in the early stages of its development, Lenovo said it is working hard to bring Tobii's eye-tracking tech to consumers. Tobii reckons a commercially viable system will arrive in about two years' time.

Such technology may be ideal for those with disabilities - Gareth the videogamer, who uses his chin to play games springs to mind - but could eye-controlled devices put extra unnecessary strain on our delicate blinkers? What are your views? ®

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.