Feeds

ZX Spectrum REVIVED as Bluetooth keyboard

Dead flesh keys could come back as controller for reborn Speccy games

High performance access to file storage

Beloved Brit microcomputer the ZX Spectrum has been resurrected, after a fashion.

Mobile games outfit Elite Systems, which repackages retro games for use on handheld devices, has announced the Bluetooth ZX Spectrum, a Bluetooth Keyboard hiding within a reproduction ZX Spectrum 48K case.

The idea is that you'd buy Elite's revived Speccy games for an iOS device, control them with the keyboard and maybe even use Apple TV to take that action to the big screen.

Elite's Kickstarter page for the project says it has been granted a license to recreate the Spectrum's case and keyboard and that it hopes to eventually make its efforts work with devices running Android and Windows. Plans to get Spectrum games into those operating systems' respective App Stores are also mooted.

If the company gets the £60,000 it needs, it will produce 1,000 keyboards that will go to supporters. Beyond that, the company is also seeking expressions of interest from those willing to pay “around £39.99” plus postage for the device. That's rather a lot for a Bluetooth keyboard of any sort, never mind one with the Spectrum's infamously-unlovely keys. On the other side, it may not be much to pay to revive the sorely under-celebrated 80s*.

Work is already under way on the device, with Elite saying it has developed a “functional prototype” pictured below.

Elite Systems' prototype bluetooth keyboard for the ZX Spectrum

Elite Systems' prototype bluetooth keyboard housed in a ZX Spectrum case

The prototype is apparently capable of controlling classic game Manic Miner, but has hit trouble with something called “keyboard ghosting” that means “some keyboard keys don't work when multiple keys are pressed simultaneously.” As the Spectrum relied on all sorts of keyboard gymnastics to get things done, ironing out the ghosting problem obviously needs to be done!

The Kickstarter page we've linked to above is not live, but suggests if fund-raising succeeds keyboards could be delivered in September 2014. ®

* Irony alert!

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.