Feeds
65%
Asus Eee AiGuru SV-1

Asus Eee Linux-based Skype Videophone

Chat with your chums, change the source code

  • alert
  • submit to reddit

Intelligent flash storage arrays

When signed in, the menu options expand to include: Search, Add Contact, Call phones, Contacts, History, Status and Account. If you’re already a Skype user, Contacts reveals all the names in your Skype address book, five names at a time, in a long row. Profiles with images are also visible. Click the down key and names can be accessed more swiftly from the alphanumeric grouping tabs at the bottom of the screen.

Asus Eee AiGuru SV-1

Win friends and influence people

Select a name and the screen transforms to show the profile image and any greeting message, with a sidebar on the right listing options to make a video or voice call together with View Profile, Remove, Block and Rename functions.

Using the videophone was actually a lot of fun. The screen fills with the video from the contact’s camera with an optional thumbnail view of your own cam in the bottom right corner. Keep the volume at a moderate level at both ends and conversations can flow without echoes. Images received from decent webcams looked really good and while the frame rates were probably in the low teens, the lip sync was good and the sound excellent at either end.

From a viewer’s perspective, compared to a Mac’s built-in iSight camera, the AiGuru SV-1 leaves a lot to be desired. The image is fairly soft and the colour somewhat washed out, although the fixed focus is good all-round.

Asus Eee AiGuru SV-1

The battery only lasts about 20 minutes, which is rather disappointing but enough to continue a conversation in the kitchen whilst sharing boiled dog recipes with the lovely Rachel. It was only when the AiGuru SV-1 was moved around that design shortcomings became apparent. Unlike old portable TVs, there’s no recessed carrying handle on the 1.6kg unit and, as you’d not want to smear the screen, the inclination is to pick it up from the sides. Yet on numerous occasions this caused an accidental click of a button or two, which terminated the call.

Beginner's guide to SSL certificates

Next page: Verdict

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Ofcom tackles complaint over Premier League footie TV rights
Virgin Media: UK fans pay the most for the fewest matches
FCC: Gonna need y'all to cough up $1.5bn to put broadband in schools
Kids need more fiber, says Wheeler, and you'll pay for it
NBN Co screws lid on FTTP coffin
Copper and HFC dominate in new corporate plan
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.