Feeds

Robot rabbits take on Facebook, female orgasms

Poked by a rabbit, figuratively and literally

High performance access to file storage

One waits ages for a story about robotic carrot-crunchers, and then two turn up at once as Karotz the robot rabbit starts talking to Facebook while app-controlled vibrator Vibease looks to sell value-added orgasms.

Karotz is the older robot. Already capable of reading out a Twitter feed while cutely waggling its ears, it can now do the same with a Facebook account, and upload photographs taken from its belly-button camera, but Vibease is the more interesting – not because it's a Bluetooth-enabled vibrator – those are old news – but because it plans to make money selling linked content rather than relying on self-administered onanism.

Vibease product shot

Vibease will launch later this year, and plans to make money selling applications linked to its hardware. In a desperate attempt to get past Apple's censors, the company has been telling startups in Asia that the content will be "erotica", not porn, and no more explicit than content already in the iTunes store.

That's a nice idea, but the existing erotic content all comes from established brands, and Apple's line is that these brands (such as Playboy and FHM) provide an inherent warning about the associated content, while unknown companies haven't managed to get so much as an exposed nipple past Cupertino's prudery.

Karotz, meanwhile, has gained some Facebook integration, so ask it nicely and the rabbit will read out the Facebook feed just as it used to read out Twitter feeds before the two became all-but-indistinguishable. Butterscotch rather marvellously got Karotz to review itself, and provides a video explaining the product: "Basically I sit atop your desk, connected to your Wi-Fi, and try to boost your mood by being cute."

So once placed into "Facebook mode", Karotz will respond to voice commands to upload photographs, and record audio updates to your status. It will even respond to being poked, but not by a Vibease – that would be weird. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.