Feeds
65%
Asus Eee AiGuru SV-1

Asus Eee Linux-based Skype Videophone

Chat with your chums, change the source code

  • alert
  • submit to reddit

Top three mobile application threats

Review Appearing a somewhat solitary member of the Asus Eee product family, the unique AiGuru SV-1 Videophone stands alone in more ways than one. At around 25cm tall, with curves akin a to Brancusi sculpture, this tabletop unit bearing a widescreen 7in LCD features built-in 802.11b/g Wi-Fi and a rechargeable battery to deliver round-the-home portability.

Asus Eee AiGuru SV-1

Asus' AiGuru SV-1: comes with full source code

While numerous messengers offer audio-visual communications on a computer, all this Asus device needs is an internet connection – Ethernet or wireless – and you’re away, waving a hand to far flung relatives or more select parts of your anatomy to a new best friend in Rio. The catch? It only works with Skype. Indeed, Asus is eager to point out that the AiGuru SV-1 is the world’s first ‘Skype Certified’ standalone videophone.

The concept brings to mind Deckard’s conversation, on a grubby Vid-Phon in The Snake Pit Bar, to his replicant sweetheart Rachel in Blade Runner. It was something to do before retiring an errant Nexus-6, formerly part of an off-world kick murder squad, who’d taken up erotic dancing instead. And yet here we have the AiGuru, apparently ten years ahead of its time, and the replicants turn out to be Chavs.

Considerably smaller than the ‘futuristic’ Vid-Phon, the AiGuru SV-1 has an 800 x 480 screen. Above it is a 0.3Mp camera, with accompanying microphone and activity light. Below is an intuitive range of controls. On the left, volume up/down, call and disconnect, plus a home key that returns to the main menu. The right cluster navigates the screen the functions: up/down, left/right, back and select. In the middle of these controls is a shower head-style speaker grille, protecting a fairly warm sounding 2in speaker.

Asus Eee AiGuru SV-1

The USB port's not used, alas

The back of the main unit is contoured with vent holes in various places. It’s all hinged on a base that houses the battery, the power button and additional interfacing at the rear for the external PSU, Ethernet, and minijack sockets for microphone and headphones. There’s also a USB port, but Asus says it’s solely for service updates.

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.