Feeds

Boffins take REMOTE CONTROL of HUMAN HAND

Science out on a limb

Application security programs and practises

Now that pacemakers are to be loaded with firewalls and bionic-man body parts are appearing on production lines, the concept of body hacking has become a spooky possibility. Researchers in Japan have begun to try to teach people how to play instruments by remotely controlling their hands.

Developed by the University of Tokyo and Sony Computer Science Labs, the aptly named PossessedHand stimulates muscles that move our digits, New Scientist reports.

A belt with 28 electrode pads is strapped to the arm, sending signals to the joints between the three bones of each finger, with two for the thumb.

PossessedHand

Beast with five fingers

Taking things further, the team then tried to teach the wearer how to play a musical instrument. As it uses all five fingertips, a koto, 13-string Japanese instrument, was chosen and finger movements were programmed into PossessedHand.

While the force generated isn't enough to make the human hand pluck, the motions are certainly felt by the wearer and, it's thought, can be used to train them into making the correct finger movement. Unlike past attempts at this sort of thing, which involved embedding electrodes in the guinea pig's flesh, this new approach is not only doesn't involve basic surgery but is more accurate too.

Test showed that players who were trained using PossesedHand made fewer errors when playing unassisted than other learners made.

PossessedHand

The test subjects felt rubbed up the wrong way though and called the experience unpleasant, almost as if their bodies had been hacked. Did they not read the smallprint?

It's a bit too Matrixy for me, although if I could be programmed to get all Satriani with my Ibanez, you wouldn't see me hit out against it. Not that I'd have the control to do so. ®

The Power of One Infographic

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.