Skip to main content

Could Optimus 3D be the phone of the Year ?



I was asking my self if a samrtphone equiped by 3D technology could be the big challenge for the mobile industry for this decade.
I remember, when i have used the LG Optimus 3D for the first time, i was very impressed.
I could not imagine that you are able to watch 3D films directely in your mobile without needing 3D glasses.
I have the chance to study more the technology and to see how LG invent a new way to show 3D images on the LCD panel.

What was impressing my, rather than the ingenious way of adding a Barrier layer in front of the LCD screen to delivere a seperate image to each eye, the many "3D" services or options that a 3D phone provide regarding a  normal use.
Using Optimus 3D phone you can :
  1. Watch 3D movies.
  2. Play 3D games.
  3. Record 3D videos.
  4. Share 3D contents(3D Youtube, HDMI (TV)).
  5. Take 3D pictures.
  6. 3D apps.
There are many ways to mesure innovation, but perhaps the most elemental yardstick, at least where technology is concerned, revolves around the job that technology in question lets you do.

An invention lets you excute two jobs that were impossible before is twice as innovative as an invention that lets you do only one new thing. 

To see how  much Optimus 3D is innovative, since it allows you  doing many jobs around the 3D technology,
I remember  the 10/10 rule introduced by Steven Johnson in his nice book Where Good Ideas Come From:The Natural History of innovation.

Based in this rule, Steven Hohnson show that new ideas take,usually, a decade to go from a new innovative idea to mass adoption.
He mentioned the case of Youtube which went from idea to mass adoption in less than two years.
Youtube let you publish, share, rate, discuss, and watch video more efficiently than ever before.
Regarding TV,Youtube gives you the ability to do many jobs. Even HDTV let you only watch more pixels than before.

Any idea can be more and more innovative by giving many new jobs or added-values in the same  time.

For these reasons 3D phone and specially the Optimus 3D with the including 3D services could be, in my opinion, the phone of the year, or may be of the decade.




Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...