Feeds

Yes! It's the NFC phone-bonk doorbell app AT LAST

Knock? Use your phone to call? NO, SCAN the TAG damn you

The essential guide to IT transformation

Home owners too lazy to answer the doorbell can relax as the latest innovation from Doorbl puts visitors in touch via a smartphone tapped to the door.

The app, available for Android and iOS, links a Near Field Communication tag to a cloud service which lets one know when a visitor is on the doorstep. This assumes the visitor has a smartphone with NFC and a working data connection, with coverage, and is prepared to combine these facilities, rather than just knocking on the door with the Mk.1 knuckle.

The humble doorbell might be considered a UX design classic. Wireless connectivity might be all the rage these days, as drilling holes is harder with modern doorframes turning plastic, but the basic single-button interface remains something with which most people are familiar.

Doorbl doesn't exclusively rely on NFC. Visitors can instead scan a QR Code sticker affixed to the frame (stop laughing at the back), but they'll still need a smartphone. The home owner needs the app installed to receive the pushed messages, and can then call the visitor back: assuming said visitor has filled in the online form with their mobile number.

NFC World spoke to Roy Solberg who developed the app, apparently because his girlfriend couldn't get to the door in time and wanted to send visitors a "please wait" message. One has to wonder if such impatient visitors are going to bother filling in their phone number on the doorstep.

Should they not bother, having decided that digging out their phone, scanning the QR Code and waiting for a data connection is, frankly, too much to bother with, then our home owner will just have to open the door to find out who's there - or shout. Shouting often works, in Vulture Central's experience.

There are alternatives. Various camera systems can offer the homeowner a view of the visitor, and the rather-more-subtle Smartbel will call one's mobile while pretending to be an intercom system, so one's visitor believes one is at home but too impolite or lazy to bother coming to the door.

But those cost money, (a hundred quid for Smartbel, or even more for battery-operated Wi-Fi doorbell Doorbot), while Doorbl is free if one tolerates the adverts. Doorbl has the added advantage of ensuring one is never at home when poor people (who lack smartphones) come calling. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.