Google Glass; Privacy Fear And Embarrassment

Google Glass; Privacy Fear And Embarrassment

Google Glass; Privacy Fear And Embarrassment
google-glass-embarrasing

Google Glass is extremely high tech and can be very beneficial to users. However, Google had to send out a reminder to such users to take them off during intimate and very, very private situations. During a conference in San Francisco for Google developers in 2013, a few attendees had forgotten to take their Google Glass off while in the bathroom. This resulted in a private situation being documented. This just goes to show that although this piece of technology proves extremely useful, wearers need to remember that they have it on at all time.

Originally, Google Glass had privacy fears surrounding it because the device can record video less noticeably than a device that is handheld. This makes it extremely difficult for others to know whether or not they are currently on camera. Others have worried about general safety, such as a cyclist trying to do something on Google Glass and not paying attention to where they are going.

Those who are spotted wearing Glass can also be subjected to what the Internet likes to call ‘trolls.’ “I was screen-casting on a huge display, and while at the OK Glass menu,” says Shazafar Khaja, a Glass user, “Someone in the audience yelled, ‘OK Glass Google pictures of naked girls’, and Google picked up on it. I quickly unplugged the cable. If I’d been a bit late, the Google search results would have flashed on the huge display.”

Reading user stories such as this one just goes to show that being a user of Google Glass can have some very unexpected, and embarrassing moments.

Kadeaus Couloute, another Glass user, tells his story about an embarrassing moment while in Japan. “The first time some teenagers saw me wearing it, they started pointing and laughing. I got closer to them to hear what they were saying, and they said in Japanese, ‘Look at him! Look at him! He is trying to be Vegeta!’. Not being a Dragonball Z fan, I thought Vegeta was a Japanese word that I had not learned yet. So I tried to translate, which failed, then I Google searched it and saw the character. I felt extremely awkward.”

Not only are hundreds of thousands of people mocking Glass, and Glass users who call themselves ‘Explorers’, all over the Internet, but there are also videos constantly being posted. These videos are parodies on Google Glass, such at filmmaker Tom Scott’s video titled, ‘A New Way to Hurt Yourself,’ which can be found here.

So all in all, it would appear that Google Glass is quite the fuel for making non-users, or non-Explorers, laugh their heads off. Sure, the device is nothing but high technology that gives users an extra boost through their day, but Glass does make a lot of people laugh. It’s no doubt that there are always going to be embarrassing Glass stories, mainly for users who are wearing their Glass in countries that might not know much, or anything at all, about the device.

By Linda Green

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…