Feeds
60%
Samsung Navibot

Samsung NaviBot robot cleaner

Today, the carpet - tomorrow, the world

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

It’s incredibly simple to start things off. After a couple of hours charging, the display on the top flashes ‘full’ and then you select the mode, and press Start. There’s a remote control so you don’t have to bend down.

Samsung Navibot

Brushes to the front...

Cleaning is done in a fairly systematic pattern, rather than just wandering around as some other robots do – though reintroducing my kitchen stools seemed to confuse it when it was returning to the charging base.

Samsung Navibot

...brooms to the side

There’s an Auto mode which will clean and then stop; Edge mode for getting right to the corner of the room; Spot mode to go over a small area; and Max, which runs the robot until its battery is flat.

Samsung Navibot

'The way to dusty death. Out, out...'

Admittedly, my flat is very untidy, and I sent the NaviBot into corners that hadn’t been vacuumed for months, but even so, as the photos show, faced with this kind of filth, the NaviBot does seem to give up a bit quickly. You may need to be done a couple of times if you’re particularly squalid.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.