Feeds

Arm-wave bye BYE! Apple grabs Kinect flail-sensor maker for $345m

Does fruity firm want fanbois to gesticulate at Apple telly?

High performance access to file storage

Apple has reportedly snapped up the Israeli firm responsible for the motion-sensing chip and hardware used in Microsoft's Kinect device.

According to the Israeli newspaper The Calcalist, Apple has finalised the acquisition of Primesense for an estimated sum of $345m. An official announcement is expected in the coming weeks.

This valuation estimate was later confirmed by AllThingsD, although it also quoted an unnamed source which said the price could end up being $20m more.

In a statement, Primesense said: "We are focused on building a prosperous company while bringing 3D sensing and Natural Interaction to the mass market in a variety of markets such as interactive living room and mobile devices. We do not comment on what any of our partners, customers or potential customers are doing and we do not [respond] to rumors or re-cycled rumors."

Earlier this year, Calcalist reported that Apple was looking to wolf down PrimeSense and had offered it $280m.

PrimeSense worked with Microsoft on the Kinect, but Redmond went on to build the device itself after licensing the 3D motion-sensing hardware and chip.

It's easy to see why Apple might want to get its hand on the Israeli firm's technology. First, Apple has already shown an interest in non-traditional ways of controlling devices, after introducing a fingerprint sensor to the iPhone 5S.

Secondly, if you look at the way Apple has been looking to manufacture its own sapphire glass screens and by designing its own chips based on the ARM core rather than contracting out that design to Samsung, it makes sense that Apple would want to own the tech rather than licensing it out indefinitely.

Thirdly, Cupertino might want it for Apple TV, to cut back on the number of buttons on both the unit and its controller, perhaps by encouraging fanbois to gesticulate at the telly to control it.

PrimeSense first pitched its tech to Apple way back in 2008. We first reported that Apple was interested in buying up the Israeli firm in July last year. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.