wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smart Shoephone: Is that technology overdose!?

profile
Vishal Nand
Apr 06, 2018
0 Likes
0 Discussions
606 Reads

This is insane! Now they have come out with a smart shoephone! One of United States top telecom service providers- T Mobile have launched their new product, Sidekick, a smart shoephone (It makes me laugh every time I type that).

Once you watch their YouTube video, you will know how crazy it can be. This product doubles up as a shoe and a smartphone-a very outrageous idea! I was shocked to see this video come up in the recommended section of my YouTube account and was pretty sure that this is some hoax that's going viral. But to my surprise, this is an actual product! [embedyt] https://www.youtube.com/watch?v=XQQuOICUylQ[/embedyt] Companies are going an extra mile to topple competition and be the boss in the industry. T-Mobile has gone beyond that by introducing such a product. The Sidekick, (i'm tired laughing, so no-more smart shoephone) has a variety of features such as retractable laces/earphones, hazard detection, speakers, pairing to other Sidekicks by a shoe tap and God knows what more! You receive calls by removing the shoe and placing it on your ears; how silly is that! My parents would think I've gone crazy if they see me do that. How can an individual walk with one shoe on and use maps on the other!? This invention has got me going bonkers. Go ahead and watch the video to see how technology is touching new highs.........or is it lows in this case? Hope its something new that you got to know and let me know what do you think of the Sidekick and whether it will sell in India. P.S: I use a T Mobile subscription in the US and feel its time to switch :-P  

Comments ()


Sign in

Read Next

Smartsheet

Blog banner

Mesh Topology

Blog banner

Os Virtual Memory

Blog banner

Uniprocessor scheduling

Blog banner

Deadlock and Starvation

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Virtual Memory

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Risk mitigation and management

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Wiretapping

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Deadlock

Blog banner

How Does SSO Works

Blog banner

10 Interesting facts you should know!!!

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Disk scheduling

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Critical success factors

Blog banner

Cache Memory in Operating Systems

Blog banner

MODERN OPERATING SYSTEM

Blog banner

AI and cyber Security

Blog banner

Service transition principles

Blog banner

Understanding the 'Ambiverts'

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Puri Jagannath temple

Blog banner

Threads

Blog banner

Introduction to Virtual Memory - 080

Blog banner

How return on investment is defined in IT services

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

The Right way of cooking

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

John Titor: The Time Traveler

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Sagar Parikrama

Blog banner

Memory input output management

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

I/O Buffering

Blog banner

Social Engineering

Blog banner