wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Smart Shoephone: Is that technology overdose!?

profile
Vishal Nand
Apr 06, 2018
0 Likes
0 Discussions
606 Reads

This is insane! Now they have come out with a smart shoephone! One of United States top telecom service providers- T Mobile have launched their new product, Sidekick, a smart shoephone (It makes me laugh every time I type that).

Once you watch their YouTube video, you will know how crazy it can be. This product doubles up as a shoe and a smartphone-a very outrageous idea! I was shocked to see this video come up in the recommended section of my YouTube account and was pretty sure that this is some hoax that's going viral. But to my surprise, this is an actual product! [embedyt] https://www.youtube.com/watch?v=XQQuOICUylQ[/embedyt] Companies are going an extra mile to topple competition and be the boss in the industry. T-Mobile has gone beyond that by introducing such a product. The Sidekick, (i'm tired laughing, so no-more smart shoephone) has a variety of features such as retractable laces/earphones, hazard detection, speakers, pairing to other Sidekicks by a shoe tap and God knows what more! You receive calls by removing the shoe and placing it on your ears; how silly is that! My parents would think I've gone crazy if they see me do that. How can an individual walk with one shoe on and use maps on the other!? This invention has got me going bonkers. Go ahead and watch the video to see how technology is touching new highs.........or is it lows in this case? Hope its something new that you got to know and let me know what do you think of the Sidekick and whether it will sell in India. P.S: I use a T Mobile subscription in the US and feel its time to switch :-P  

Comments ()


Sign in

Read Next

Different memory allocation strategies

Blog banner

Deadlock and starvation in operating system

Blog banner

Blockchain uses and use cases

Blog banner

SESSION HIJACKING

Blog banner

Latest Email Marketing Techniques

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Deadlock

Blog banner

Trends that began during the pandemic

Blog banner

The IT Service Lifecycle

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

INSTAGRAM

Blog banner

Dal Bafla Recipe

Blog banner

Culture Of Ladakh

Blog banner

Cyber Security in Data Breaching

Blog banner

City of Mumbai (Bombay):

Blog banner

Kernel in Operating System

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Guidelines for a low sodium diet.

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

I/O Buffering

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Types of threads

Blog banner

Challenges and risks in service operations

Blog banner

Direct Memory Access

Blog banner

Network Forensics Tools and Techniques

Blog banner

objectives and functions of operating system

Blog banner

Wedding photographer

Blog banner

Starvation

Blog banner

Measuring IT Risk

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Linux VServer Architecture

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Big Data Architecture

Blog banner

american greatines

Blog banner

Gamer life

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Zomato (Income Sources)

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

APACHE KAFKA

Blog banner