Elizabeth it's a great way of using the technology Thanks for sharing.
When I reading this, First thing that comes to my mind is that this is a great tool for the politicians, cause that by using this all the ground works can be ignored for the politics meetings such as checking security, Road blocking.............. Which is a hell of a mess for the public.
Those are also good ideas for uses, Pubudu, especially the political one. it definitely could save on security, although I think it would lack that personal factor politicians like to give when they press the public flesh. But perhaps it could just supplement these appearances sometimes.
Yes, and you're definitely right, Pubudu, there are a lot of public benefits to using something like this to make a "public" appearance. As the adoption of Double expands, perhaps this will be one way it is utilized.
@Elizabeth: Indeed and I have personal experience in my country itself. Even though there are so many technology evolved and are more powerful, still they need the security to go with them physically. I have no idea why but that is the nature. Maybe they are kind of used to it.
Yes, Ann, it is similar, and I think hospitals are begining to use Double for medical presence as well. I can see your point about it being humorous in an office setting, but also quite handy! I wonder how many in-office jokes there are about the Doubles being used. ;)
By the way, Ann, thanks also for passing this idea along to me! I think I saw something about it last year but didn't obviously cover the story then. It was a fun one to write about and is quite interesting.
Ha, Dilbert...always ahead of his time! Well, I am not sure about hacking into this system, but you could be right. The thing is, iOS is pretty stable and hackers don't tend to target its vulnerabilities (if there are any--of course there are) the way they target Windows. I don't see it having any security issues any more than any other PC or Mac connected to a company network.
Security issues? Tell me about it, in a previous job I was responsible for data security. Here's the vulnerability - leave your phone on your desk while you pop out for a bathroom break, and when you come back you'll see your telepresence robot chasing the CTO down the hallway.
(leaving computers logged in and unattended is one of the biggest security breaches)
So you consider Double a "logged in and unattended" computer then, Battar? I am just trying to understand if that's what you mean. The thing is, someone is remote controlling the robot from home, so it won't be unattended at all. The person ultimately will be in control of its actions. If you mean something else, forgive me for not understanding!
What should be the perception of a product’s real-world performance with regard to the published spec sheet? While it is easy to assume that the product will operate according to spec, what variables should be considered, and is that a designer obligation or a customer responsibility? Or both?
Biomimicry has already found its way into the development of robots and new materials, with researchers studying animals and nature to come up with new innovations. Now thanks to researchers in Boston, biomimicry could even inform the future of electrical networks for next-generation displays.
Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.