Feeds

Google patent filing suggests Glass will be ULTIMATE REMOTE

Headset computing to control your life

High performance access to file storage

Google's Project Glass computing specs could solve one of technology's most enduring problems – finding where you put the remote control.

A patent filing from the Chocolate Factory shows that the firm wants to build control of everyday objects into its head-mounted hardware so that the wearer can use voice commands to order about other systems and get the know-how to use them when needed.

"A wearable computing device may facilitate the wearer's operation of or understanding of a particular device, described herein as a 'target device,' that is located in the wearer's environment," reads US patent application 20130069985, "Wearable Computer with Superimposed Controls and Instructions for External Device".

"The target device could be any electrical, optical, or mechanical device. For example, the target device could be a home appliance, such as a refrigerator, espresso maker, television, garage door, alarm system, indoor or outdoor lighting system, or an office appliance, such as a copy machine."

One example given is linking the glasses into an office printer. If the printer runs out of paper, the glasses will project an alert on the viewing eyepiece and then guide the wearer through the process of adding more in the correct tray. Similar heads-up displays could be used for a range of functions, possibly displayed on the glasses themselves or on other objects, using lasers built into the spectacles.

Mountain View has set a price of $1,500 for first glasses (although one enterprising eBayer receiving offers of ten times that sum before the auction was pulled), and is expected to announce availability of the hardware at this year's sold-out Google I/O developer conference.

That's a lot of money for a glorified remote control.

Google's been promising the Glass spectacles for nearly a year, and Sergey Brin is seldom seen in public without a pair these days. This patent filing adds more functions to glasses that are already being touted as having the ability to recognize people by their clothing style and which may "end privacy as we know it." ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.