Feeds

Nod Labs forges one (Bluetooth) ring to rule them all

Point and click fingering is the future, claims team

Internet Security Threat Report 2014

A team of engineers formerly from Google and Jawbone thinks it has cracked gesture recognition for electronics with a Bluetooth-equipped ring that can control cursor movements and manipulate household devices.

Nod Labs Bluetooth ring

The Nod sans cover

The Nod is a somewhat bulky black ring of surgical steel with a touchpad and two buttons built into the base. It houses a nine-axis accelerometer and two Cortex M3 processors to provide the grunt. The manufacturers claim the device's Bluetooth will give it a range of 30 feet and its open development platform is compatible with Windows, OS X, iOS, Android 4.4, and Linux.

When wearing the ring, a hand gesture will move a cursor in a computer, TV, or smartphone screen. The touchpad on the base of the ring gives additional control and buttons on the base allow for clicking keys or programmable actions, and hand movements like twisting can be used to control onscreen dials or devices like the Nest smart thermostat.

Youtube Video

Nod is also touting the ring as a security device, enabling an extra level of authentication on smartphones and computers when it is close enough to be registered. That does leave you with a rather large problem if you lose the thing, however.

The ring comes in four sizes, with inserts so that a variety of different finger sizes can be accommodated. The battery is good for a day of use before it has to go back into its charging station. Preorders on the device start on Tuesday and the firm is selling each unit for $149.

Whether or not it will get any takers is another matter. Gesture control has been around for a while now and there's little evidence that it's a killer app.

Sure, Microsoft bundles it in with the Kinect and Intel is making some moves in the area. But gesture controllers like Leap Motion have hardly set the world on fire, and Nod's ring may be consigned to the long list of "pretty but useless" gizmos that litter the tech industry. ®

Internet Security Threat Report 2014

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Will BlackBerry make a comeback with its SQUARE smartphones?
Plus PC PIMs from company formerly known as RIM
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Soundbites: News in brief from the Wi-Fi audiophile files
DTS and Sonos sing out but not off the same hymnsheet
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.