Feeds

Microsoft demos creepy car stalking system

Family micromanagement

Providing a secure and efficient Helpdesk

BUILD Windows Phone 7.5 and Azure are letting one Microsoft director stalk his kids while they’re on the road.

His Windows smartphone app allows a third party to track a car fitted with a Viper SmartStart GPS system and monitor its speed, location, engine revs and battery – or lock and shut down a vehicle if it’s stolen. Jeff Sandquist, senior director of developer relations for Microsoft and self-confessed car nut, said he loves the app because he can follow his daughter around remotely while she drives her VW Beetle.

“I love it when we can use technology to micromanage our families,” he said during a demo of the application at the BUILD conference in Anaheim, California. El Reg hopes for his sake Sandquist’s kids aren’t picking his retirement home.

Viper already has similar applications for the iPhone, Blackberry, and Android handsets, so Microsoft’s late to the party. But Redmond is linking the application into Azure to ensure that no matter where the driver goes someone will always be able to keep watch on them.

Sandquist also announced that Redmond is getting into the reality show market. It has commissioned the West Coast Customs body shop to build a car using Microsoft’s software and hardware, and the job will be televised on the Discovery Channel's "Inside West Coast Customs".

West Coast Customs has built vehicles for such luminaries as Paris Hilton and Justin Bieber, and it will be working with Microsoft to build in Kinect motion control, heads-up displays on the windscreen, and on-board computers for navigation and control.

“We’re taking a 2012 Mustang and dropping a 1967 body on it, blacking it out and building the supreme technology car,” the heavily tattooed Ryan Friedlinghaus, founder of West Coast Customs, told the crowd.

While the idea sounds interesting, El Reg has concerns. Bluescreening is bad enough at the desk, but slightly more serious when you’re flinging a couple of tons of car down the freeway. ®

Protecting against web application threats using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.