Archive for February, 2014
“Hon, did I leave the monthly report up in the kitchen?” Steve’s voice floated up from the home office, and Julie looked around the kitchen. “No, I don’t see it up here Steve. Where else might you have left it?”
“Darn, I wonder if I left it on my desk at the store,” Steve muttered. It was almost 9 pm and the store would be closed up and everyone gone. Steve went upstairs to the kitchen. “I don’t want to drive all the way down to the store, if the report isn’t there,” he told Julie, ” It would take me an hour to get there and back.”
“Well, that’s easy to check,” said his wife. She walked over to the tablet computer that she had been using to check on flights, and logged into the security portal for their business. After using the two factor authentication, a secure connection was setup. She sent a command to the Vigilant security robot that was currently patrolling the warehouse area. The robot stopped its patrol, went to the office area and over to Steve’s desk.
Julie activated the on-board camera system and used the camera controls to scan the top of Steve’s desk. “Steve, the report is not on your desk, anywhere else it might be?” Steve thought for a moment, “Wait, I remember! I had it on top of the box of samples I put in the trunk. I’ll bet that’s where it is.” As he went to the garage to check the trunk of his car, Julie pulled up the shift report from the Security Robot, and noticed that there had been reports of break-ins through high windows in other warehouses in the area. She quickly told the robot to focus more patrol time in the warehouse, and to do a high-visibility patrol – activating its headlights as it passed the windows.
Steve came back from the garage with the report in his hand and mentioned that he would have been really mad if he had had to drive all the way down to the office only to find that the report wasn’t there.
As the Internet of Things continues to grow, we will experience incidents like this more and more frequently. We will continue to have more access and more control over every day actions, regardless of where we are in the world at the time. The Security Robots available from Gamma 2 Robotics are already ‘internet aware’ and give their owners unprecedented control of their physical security assets – when you need them, where you need them!
To learn more about the capabilities of Vigilant Security Robots and The Internet of Things, contact us by web or phone: +1 303.778.7400
Where is your robot?™ Our American-made security robots are at work keeping people and property safe and secure.
Check out this great article from Bax & Williams:
It reads, in part, “we argued that whilst Bill Gates’ famous prediction hadn’t quite been realized thus far, we were fast approaching a tipping point for an age of robotics.”
One critical aspect of the Robotics Revolution is making sure that robots can work alongside people. Industrial robots completely changed manufacturing, lowering Cost of goods Sold (COGS) and increasing quality. But these robots are not safe around people; hundreds of workers are injured every year in industrial robot accidents. Our security robots are designed ‘from the ground up’ to be safe around people – we even use them to serve food at parties!
Just this week, Dyson added itself to the list of global companies investing in robotics! Check this article.
We are currently doing additional tests in a office building in Denver, CO. With robots running up and down the hallways along side the people working in the offices. To find out more about our testing give us a call +1 303-778-7400, or check out our website.
More to follow,
Where is your robot? Find out more info at Gamma 2 Robotics
Later this month, the Gamma 2 Robotics security robots will be at the upcoming Gartner CIO Leadership Forum. No, they are not switching professions. But, as the technology for securing critical corporate information becomes more sophisticated, it relies on the same infrastructure as the system it protects. Every byte of electronic information is written on a hard drive somewhere, whether it is in your dedicated server room, or in the cloud, and some CIO has the responsibility of protecting that data.
These advances mean that across the C-suite, more knowledge and understanding of the impacts and benefits of advanced security tech is needed. We will be one of a select group presenting to the CIO Leadership Forum, and talking with the CIO’s about the kind of technology they are going to be relying on to do their jobs well.
Where is your robot?® Ours will be chatting with world leading Chief Information Officers in Phoenix as part of the Gartner CIO leadership Forum.