Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Technology From LG Lets You See What a Bowling Ball Sees [VIDEO]

b2ap3_thumbnail_lg_rolling_security_400.jpgNew consumer technology holds a special place in many users’ hearts. In particular, the LG Rolling Bot looks like it will be a nifty little device to leave either in your office or at home. Basically, it’s a rolling security camera that can be controlled remotely through a smartphone.

The LG Rolling Bot is actually pretty neat and is capable of many different feats remotely. It works by connecting to your home or office WiFi connection and is controlled via a smartphone app. Through your device, you can see what the Rolling Bot’s camera sees, and hear what the bot hears. This makes it great for a roving security tool, but you can also speak through the app as if you were there. Furthermore, the LG Rolling Bot can connect to and interact with other smart home appliances via Bluetooth. This is great in some cases, as it lets you turn off devices if you’ve accidentally left them on.

Perhaps one of the most fun features of the LG Rolling Bot is its laser pointer. You can use it to bother your pets while you aren’t there. In general, it looks like the LG Rolling Bot will be able to change the way that you handle pet sitting. By using its camera to wirelessly monitor your cat, dog, or other pet, you can ensure that they’re both safe and entertained. Using the voiceover feature can let you communicate with them even when you’re not there, which might be fun for you, but confusing for them.

You can see the LG Rolling Bot in action in this video from DigitalTrends:

Of course, you also need to take into consideration the security issues that come from using such a device. By using your home or office WiFi, the device can potentially be put at risk of encountering dangerous malware or viruses. If this happens, it can be hacked like any normal Internet-connected security camera. Granted, there isn’t much that a rolling device like this can do, but the real issue that comes from this is how unsettling it can be to unknowingly have someone watching your home and your family through the device.

On the other end of the controls, what if your smartphone were to get hacked somehow? Hackers could remotely control the device, watching, listening, and potentially even speaking through the app’s controls. There have been horror stories of devices like baby monitors being hacked too, so there’s a precedent set for this type of vulnerability. This is a common problem with many Internet of Things devices. They might have great capabilities, but if they’re compromised somehow, they can be exceptionally dangerous. In many cases, the devices aren’t necessarily threatening, but the possibilities for them to be tampered with shouldn’t be ignored.

Now, it’s time for the real question that we want answered: how is the LG Rolling Bot going to handle stairs?

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 15 November 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Network Email Holiday Data Quick Tips Virtualization Save Money Remote Computing Operating System Social Media Upgrade Going Green Business Continuity Office Mobile Device Management Saving Money Apps Disaster Recovery Alert Chrome Small Business Android WiFi Identity Theft The Internet of Things Antivirus Big Data Managed Service Provider Microsoft Office Application Social Best Practice Facebook Mobility Employer-Employee Relationship Ransomware Information Technology Spam Saving Time Bandwidth Unified Threat Management Lithium-ion battery Hacking Tablet Printer Law Enforcement Passwords Office Tips BYOD Password History Analytics Search Gmail Browser Current Events Government Net Neutrality Firewall Computers iPhone Disaster Laptop Collaboration Recovery Network Security Wireless Automation Avoiding Downtime Phone System Router Hard Drives Maintenance Apple Work/Life Balance Fraud Gadgets Smartphones Users USB Money Data Management Encryption communications Remote Monitoring Tech Support Streaming Media Telephone Systems Education Humor User Error intranet Data Loss Cost Management Benefits Retail Personal Information Wearable Technology BDR Entertainment Proactive IT Cybercrime Risk Management Mobile Office Online Currency Managed IT Services Managing Stress Private Cloud Wireless Technology IT Solutions Update Wi-Fi Flexibility Budget Outlook VPN Printer Server Shortcut Business Intelligence Transportation Internet Exlporer Biometrics Marketing Administration App Social Engineering Office 365 Telephony Customer Service Content Filtering Virtual Reality Point of Sale IT Consultant Google Drive Fax Server PowerPoint DDoS Twitter Instant Messaging Internet of Things OneNote Bloatware IT consulting Prodcuctivity Safety Applications Artificial Intelligence Distributed Denial of Service Mouse Battery Sports OneDrive Online Backup Branding Emergency Touchpad Bring Your Own Device Paperless Office eWaste Network Congestion Automobile Workplace WIndows 7 Display Cleaning Operating Sysytem Miscelllaneous Television Storage Worker Commute Files Two-factor Authentication Bluetooth Save Time HIPAA Video Games Trending Travel Chromecast Customer Relationship Management SharePoint User Regulations Hacker Legal ISP Excel Website Administrator RAM 3D Printing Teamwork Best Available Ebay Keyboard Reputation Presentation Amazon Blogging Politics Access CPU Meetings Cameras Hiring/Firing Data Theft Scalability Hosted Solution Science Smart Phones Experience Slow End of Support Running Cable Phishing CloudSync How To Networking Windows 8 Music Robot Advertising Compliance Programming Human Resources Near Field Communication Vendor Management Books Data storage PDF Inbound Marketing Black Market Uninterrupted Power Supply Computing Emails Electronic Medical Records Audit Text Messaging HaaS Computer Accessories

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code