SlideShare a Scribd company logo
1 of 3
#<br />##<br />THE NEW VOICE-TOUCH TELEPHONE<br />My product is ---The New Touch-ID Phone<br />What it does--My product for new technology will have the capability to detect a caller’s name-location-telephone number-and in cases where there is an alert or open file for criminal activities; will also be relayed along with photo ID of the caller.<br />Benefit--My product will benefit the world by helping to keep us safe .  The new touch ID phone will have the capability of Identifying the caller with a single touch and the sound of their voice.  If the caller attempt to block their call, wear gloves, have someone else call and then take the call--nothing will deter the caller from being identified.<br />This will benefit the world with capturing prank callers, stalkers, terrorists, abusive mates-kidnappers ect..<br />Simular Prod--Caller ID--Military use of In fared and heat seeking devices<br /> <br /> Difference--All products rolled into one single everyday device---Saving valuable and crucial time in locating threats to our family--country--and fellow citizens<br />Materials--I would need to have the Sensors--Chips--Telephone--<br />Cost--- Negot. With large telephone company to be the primary carrier--Money to train and employ workers to sell and support product--Engineers--Mgr--Programmers---$100,000,000 in this Economy probably more<br />Compared to--Iphone--Blackberry<br /> <br />
New technology
New technology

More Related Content

Viewers also liked

Manual de instalacion de windows 8
Manual de instalacion de windows 8Manual de instalacion de windows 8
Manual de instalacion de windows 8Yeca Pabon
 
Setting up resources
Setting up resourcesSetting up resources
Setting up resourcesahmed hamza
 
Cultivating the Garden District
Cultivating the Garden DistrictCultivating the Garden District
Cultivating the Garden DistrictClare Strawn
 
Functional Design Lab
Functional Design LabFunctional Design Lab
Functional Design LabiFactory
 
Esc guidelines for guidelines update 2010
Esc guidelines for guidelines update 2010Esc guidelines for guidelines update 2010
Esc guidelines for guidelines update 2010Domènec Melgosa Arnau
 
Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01
Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01
Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01Shadid Al
 
День лингвиста (19.11)
День лингвиста (19.11)День лингвиста (19.11)
День лингвиста (19.11)Ekaterina Kushnir
 
Collaborative Solutions eHealth Event - Microsoft
Collaborative Solutions eHealth Event - MicrosoftCollaborative Solutions eHealth Event - Microsoft
Collaborative Solutions eHealth Event - MicrosoftCollaborative Solutions
 
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of  June 2008-Lessons Learned by Nurse JoanieMercy Medical Center Flood of  June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse JoanieJoanie McMahon MS,BSN,RN
 

Viewers also liked (12)

Smart card
Smart cardSmart card
Smart card
 
NOMBRES CHINOS
NOMBRES CHINOSNOMBRES CHINOS
NOMBRES CHINOS
 
Manual de instalacion de windows 8
Manual de instalacion de windows 8Manual de instalacion de windows 8
Manual de instalacion de windows 8
 
Setting up resources
Setting up resourcesSetting up resources
Setting up resources
 
Cultivating the Garden District
Cultivating the Garden DistrictCultivating the Garden District
Cultivating the Garden District
 
Functional Design Lab
Functional Design LabFunctional Design Lab
Functional Design Lab
 
Front Foot - Ben Astill
Front Foot - Ben Astill Front Foot - Ben Astill
Front Foot - Ben Astill
 
Esc guidelines for guidelines update 2010
Esc guidelines for guidelines update 2010Esc guidelines for guidelines update 2010
Esc guidelines for guidelines update 2010
 
Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01
Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01
Thephilosophicalbackgroundofchildhoodeducationin 111202174236-phpapp01
 
День лингвиста (19.11)
День лингвиста (19.11)День лингвиста (19.11)
День лингвиста (19.11)
 
Collaborative Solutions eHealth Event - Microsoft
Collaborative Solutions eHealth Event - MicrosoftCollaborative Solutions eHealth Event - Microsoft
Collaborative Solutions eHealth Event - Microsoft
 
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of  June 2008-Lessons Learned by Nurse JoanieMercy Medical Center Flood of  June 2008-Lessons Learned by Nurse Joanie
Mercy Medical Center Flood of June 2008-Lessons Learned by Nurse Joanie
 

Similar to New technology

World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlanKart Griffin
 
Indiegogo campaign FIN ROBOTICS
Indiegogo campaign FIN ROBOTICS Indiegogo campaign FIN ROBOTICS
Indiegogo campaign FIN ROBOTICS Dr Ritesh Malik
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketAlexander WEIR
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing researchFinbarr Ring
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
The Pied Piper
The Pied PiperThe Pied Piper
The Pied PiperAodrulez
 
Digital Entertainment needs Content Protection : The case of Marvel & Digital
Digital Entertainment needs Content Protection : The case of Marvel & DigitalDigital Entertainment needs Content Protection : The case of Marvel & Digital
Digital Entertainment needs Content Protection : The case of Marvel & DigitalJérôme Perani
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityVitor Domingos
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06johnhewitt_cpp
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida26
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyDavid Rogers
 
Role play - The internet of things - Nanotechnology
Role play - The internet of things - NanotechnologyRole play - The internet of things - Nanotechnology
Role play - The internet of things - NanotechnologyNANOYOU
 

Similar to New technology (20)

World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlan
 
Mass bugsweep
Mass bugsweepMass bugsweep
Mass bugsweep
 
Indiegogo campaign FIN ROBOTICS
Indiegogo campaign FIN ROBOTICS Indiegogo campaign FIN ROBOTICS
Indiegogo campaign FIN ROBOTICS
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution Market
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Eisfor marketing research
Eisfor marketing researchEisfor marketing research
Eisfor marketing research
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
The Pied Piper
The Pied PiperThe Pied Piper
The Pied Piper
 
Digital Entertainment needs Content Protection : The case of Marvel & Digital
Digital Entertainment needs Content Protection : The case of Marvel & DigitalDigital Entertainment needs Content Protection : The case of Marvel & Digital
Digital Entertainment needs Content Protection : The case of Marvel & Digital
 
Confraria Security & IT - Mobile Security
Confraria Security & IT - Mobile SecurityConfraria Security & IT - Mobile Security
Confraria Security & IT - Mobile Security
 
Products
ProductsProducts
Products
 
Information Security 5 06
Information Security 5 06Information Security 5 06
Information Security 5 06
 
Protecing your IP
Protecing your IPProtecing your IP
Protecing your IP
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
Role play - The internet of things - Nanotechnology
Role play - The internet of things - NanotechnologyRole play - The internet of things - Nanotechnology
Role play - The internet of things - Nanotechnology
 
Presentation1
Presentation1Presentation1
Presentation1
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

New technology

  • 1. #<br />##<br />THE NEW VOICE-TOUCH TELEPHONE<br />My product is ---The New Touch-ID Phone<br />What it does--My product for new technology will have the capability to detect a caller’s name-location-telephone number-and in cases where there is an alert or open file for criminal activities; will also be relayed along with photo ID of the caller.<br />Benefit--My product will benefit the world by helping to keep us safe . The new touch ID phone will have the capability of Identifying the caller with a single touch and the sound of their voice. If the caller attempt to block their call, wear gloves, have someone else call and then take the call--nothing will deter the caller from being identified.<br />This will benefit the world with capturing prank callers, stalkers, terrorists, abusive mates-kidnappers ect..<br />Simular Prod--Caller ID--Military use of In fared and heat seeking devices<br /> <br /> Difference--All products rolled into one single everyday device---Saving valuable and crucial time in locating threats to our family--country--and fellow citizens<br />Materials--I would need to have the Sensors--Chips--Telephone--<br />Cost--- Negot. With large telephone company to be the primary carrier--Money to train and employ workers to sell and support product--Engineers--Mgr--Programmers---$100,000,000 in this Economy probably more<br />Compared to--Iphone--Blackberry<br /> <br />