The Worst Ideas. Updates every Monday!

Your weekly source for terrible ideas.

Category: Technology

Phone manufacturers hate this one weird tip to save you HUNDREDS of dollars by not losing your phone! One frugal tip for saving money on smartphones (do not lose them).

The issue:

Cell phones occasionally fall out of a person’s pockets and get forgotten. This is especially easy to do when sitting on a sofa or in a movie theater seat.

If the phone could detect that it had been dropped into sofa cushions, it could notify you before it was too late to find it again!

sofa-phone-cushions

sofa-phone-here-exclamation

Fig. 1: Alas, this phone has fallen between sofa cushions and may soon be lost forever.

sofa-phone-here-it-is

Proposal:

The phone could use its microphone to detect the difference between “phone is in your pocket” and “microphone can only detected sounds that are muffled by sofa cushions” (Fig. 2).

sofa-phone-waveform

Fig. 2: Audio from two scenarios: “normal” (top, yellow) and “stuck in sofa cushions” (bottom, blue).

By listening to the phone’s microphone (and using the orientation sensors), the phone could distinguish between three situations:

  1. “In your pocket” (phone is slightly moving, but sounds are muffled)
  2. “On your desk” (phone is not moving, but background noise is crisp and clear, like a transparent apple)
  3. “Phone fell into the sofa” (phone is not moving, but sounds are muffled).

In case you are worried about the privacy implication of the constant use of the microphone, consider that all phones are monitoring you at all times anyway so that you can say “Hey Siri” / “Ok Google” in order to activate the voice assistant.

Thus, this additional monitoring would not be any more invasive than the current situation.

(Plus, the “fell into the sofa” detection could be done entirely on the phone, so it wouldn’t need to send any audio data to a remote server.)

sofa-phone-ring

Fig. 3: Once the phone detects that it has become trapped in the sofa, it can scream until you rescue it.

This feature could also be expanded to include things like:

  • The phone could detect that you have debarked your plane (or gotten off a train), but somehow the phone has been left behind, perhaps in one of those seat pockets.
  • The phone could detect that 1) it’s been several hours since it’s moved it all, 2) it’s close enough to see your own home WiFi network, and 3) the audio sensor informs it that it’s still in a pants pocket—this means you probably threw it into a laundry basket, so it should email you and/or start beeping so you don’t wash it.
  • The phone could detect that you were traveling by car and left your phone in the car. Then it could send you an email (“Hey, you left me in the car. –Your Phone”), which you would presumably receive on your laptop / desktop computer.

Conclusion:

Don’t buy a new phone unless it comes with this exciting new feature!

PROS: Saves you from many lost-phone mishaps.

CONS: Perhaps by further reducing the demands on humans to actually pay attention and keep track of things, future generations will become slothful and decadent.

Cease your unforgivable indolence! Motivate yourself to exercise with this new kind of stationary bike! Locksmiths hate it!

Background:

It can be hard to motivate yourself to exercise—especially since you know you can always put it off until later.

Proposal:

But what if we could set up a situation where you would have to exercise?

Specifically:

  1. You purchase (1) a stationary bicycle and (2) a special type of heavy-duty safe (Figure 1).
  2. You then place an important object inside the safe (like your cell phone, wallet, or keys). This should be something that you’ll need soon (not like, a Ming vase).
  3. In order to open the safe, you have to pedal the bike at least (say) 20 miles. This is measured by a gear on the side of the safe.

pedal-safe

Fig. 1: Even if you know the correct combination to the safe (right), the bike (left) absolutely must be pedaled a certain distance before the safe will open.

If you want to get your phone / keys / wallet, you’ll have to put in the required time on the exercise bike—there’s just no way around it!

 

 

items

Fig. 2: Example items that you might put into your pedaling-required-safe to motivate yourself.

Conclusion:

The main benefit of this system is that it’s always easy for a person to say “I should exercise in the future” and lock their keys and wallet in the safe.

Then, even if their self-motivation wanes and they don’t feel like exercising later, they won’t be able to back out!

This system could be extended beyond just exercise bikes: perhaps the safe could be connected to a pull-up bar (“Do 10 pull-ups before this safe will open”), or to a page counter on a book (“Read 50 pages of this book before the safe will open.”)

pedal-safe-schematic

Fig. 3: Schematic view of the safe. Maybe this image would be in the manual or something.

 

PROS: This idea will help promote exercise and increase self-discipline and civic virtue.

CONS: If there’s an emergency and you need to drive somewhere quickly, you’ll be out of luck!

The horrifying secret that APPLE, GOOGLE, and MICROSOFT don’t want you to know about laptop longevity! Stop being part of the “laptop rat race” with this new insane beverage-related tip. Tip number 5 will shock you!

Background:

Millions of laptops are destroyed every year by spilled drinks (Figure 1). Unfortunately, this is a difficult problem to address, because laptops and beverages are frequently in close proximity.

normal-laptop-and-water

spill

Fig. 1a (top) and 1b (bottom): You have probably either experienced this situation first-hand or observed it happen to someone else. If only there had been some warning ahead of time about the peril the laptop was in!

Proposal:

If the glass-full-of-liquid danger were more immediately obvious, many laptops could be saved from a thirst-quenching death—the laptop user would simply need to place the drink slightly farther away from the laptop than they normally would.

By adding a ring of laser emitters to the beverage container, the spill danger can be made obvious: the lasers will project a circular “spill danger zone” on the table, informing you of any imperiled electronics (Figure 2).

danger-zone

Fig. 2: The laser emitters on the top of the glass (shown as red triangles) project a “spill danger zone” region around the glass. You should move any sensitive electronics outside of this area.

An advanced model of this idea could also have an integrated camera: this would allow it to only project the “danger zone” markings if it actually detected an object in the spill area, instead of all the time (which might get annoying).

PROS: Saves your laptop from destruction!

CONS: The lasers might melt people’s eyeballs when you raise the glass to drink from it.

 

Five underrated facts about dystopian totalitarian surveillance regimes! You’ll never believe fact #2!

Background:

The optimal tradeoff between privacy and security is a topic that is endlessly debated.

In the past, omnipresent surveillance was not feasible—but technology is now at the point where implementation of a 1984-esque surveillance state is actually possible.

On the one hand, it would be theoretically convenient to have immediate response to crimes and/or injuries, and perhaps take action to prevent some crimes before they even occur.

On the other hand, you might be sent to a faraway gulag because you opposed the interests of a politically-connected individual.

Proposal:

The problem here, of course, is the human element (see Figure 1).

monitor-computer-guy

Fig. 1: This guy (right) can monitor every aspect of your life on the video screens (left). This works fine until you become successful and he blackmails you!

But if an all-seeing computer system (like Skynet in the Terminator series) were in charge of things, we could could theoretically know that the surveillance system could not be misused, and would only be used for the programmed-in purposes (e.g., catching kidnappers and insane murderers).

Humans would write the rules for the system, but the raw data would (somehow) be inaccessible except to the analysis computer (Fig. 2).

Some example rules that might be applied:

  • If a car was used in a felony, check traffic cameras for its license plate number.
  • If a person has purchased explosive-manufacture-related chemicals, check their records for unusual activity and potentially flag them for further investigation by actual humans.
  • If a person declared no taxable income, but drives around in an 80,000 dollar car, check them for tax fraud.

Since these rules could be set by the legislature, they could be transparent and subject to review by the voters.

One downside: many countries operate on implicit rules like:

  • If a person supports an opposing political party, make sure to harass and imprison them.
  • If a person is a member of a disfavored ethnic or religious group, make sure to hold them to the strictest letter of the law.
  • Otherwise, don’t enforce any rules at all.

These informal enforcement rules might be less likely to survive if they had to be explicitly coded up and put on the official registry of surveillance rules. Or perhaps they would remain, and just be enforced with horrific robotic precision!

robot-wheel

Fig 2: This robot is totally trustworthy with your personal data, and has no ulterior motives or desires of its own (unlike a human).

seeing-eye

Fig 3: This unblinking “panopticon” eye will be a useful symbol to let you know you are in a safe and trustworthy robot-surveilled region! Stick one of these in your bedroom and bathroom to remind you that a robot is watching you at all times.

Conclusion:

When you lobby for omnipresent surveillance, make sure to imagine the predicable scenario where some irrationally angry neighbor or ambitious business rival now has a recording of every stupid thing you (and your friends/family) have ever done!

PROS: Would probably reduce many types of crime.

CONS: Terminator and/or 1984.

 

 

 

Travel almost for FREE with this one weird tip! One insane way to reduce your spending on airline tickets now.

The issue:

Travel to exotic locales can be expensive, inconvenient, and perhaps even dangerous or impossible.

Proposal:

Using the same technology that companies like Google use to get street view images (now available in 40-lb backpack format as well: https://www.google.com/search?tbm=isch&sa=1&q=google+street+view+camera ), we can set up a scenario where you can conduct tourism by proxy using a VR headset.

This would work as follows:

  • You submit a request online, like “I’d like to see the pyramids of Giza.”
  • Someone who is already in the vicinity accepts your request. You pay them and they put on a panoramic street view camera.
  • You then call them up and perform the VR equivalent of a Skype / FaceTime / Hangouts call.
  • The tour guide will either walk around on their own, or perhaps take requests from the remote viewer.

proxy_guy

Fig. 1: This fashionable individual in a VR headset is standing comfortably at home while getting a VR tour of Egyptian pyramids, which is directed by the person in Figure 2.

desert

Fig. 2: This “VR tour guide” is carrying the cameras and microphones so that the individual in Figure 1 can get an immersive real-time VR tour of the pyramids.

scuba_water

Fig. 3: In addition to enabling extremely lazy travelers, VR tours could be used to experience otherwise difficult or impossible environments.

Eco-friendly final point:

This technology would also reduce the amount of energy expended on travel (particularly via airplane), which both saves fuel and also reduces the number of greenhouse gasses generated.

PROS: Saves time, money, and the environment.

CONS: Might negatively impact revenue at certain difficult-to-access tourist destinations like Machu Picchu.

Vanquish loneliness and existential dread with this one weird app that doesn’t exist (yet)

The issue:

Sometimes, it’s hard to keep in touch with your friends and family, especially if you live in different cities and time zones.

Proposal:

The solution is quite simple—an app that keeps track of when you last met up with, texted, called, or otherwise contacted your friends and family.

In fact, it could even be integrated directly into your messaging app and phone GPS, so the phone could automatically keep track of which relationships were being maintained. (Both your national government and companies like Google have more than enough information to do this already, but it’s unlikely to be a crowd-pleasing feature, so don’t expect it to show up on your phone any time soon. Fortunately, this still leaves the door open for an enterprising startup to create this program.)

The example program below (Figures 1 and 2) is called “FriendNeglectr” (if that gets trademarked, “Neglectly” and “FriendNeglect.io” are other popular startup-sounding names that could be employed).

friendneglectr-icon

Fig 1: The proposed FriendNeglectr icon.

friendneglectr-emphasis

Fig 2: Here, we see a list of several of your friends in FriendNeglectr, ordered by the time you last saw them. For example, you last met Dave (top) for coffee 4 months ago. But you haven’t seen Alfonso (bottom) in 1.5 years, so the bar is highlighted in red. 

Conclusion:

You should stay in contact with your friend Alfonso, even though the last time you saw him was in court (Fig. 2). Also, since this app doesn’t exist yet, you should develop it.

PROS: Helps you maintain important relationships that might otherwise be neglected due to time and distance.

CONS: Reminds you of the ubiquitous and inescapable surveillance of modern society, filling you with a chilling dread of a future “Orwell’s 1984”-esque world.

You’ll never eat an ice cream cone again after learning this horrifying secret! Also: the top 5 flavors of ice cream from your childhood that are NO LONGER made!

The issue:

Sometimes, when you’re eating an ice cream out of a cone, you will suffer the indignity of having the ice cream drip onto yourself and/or the ground (see Fig. 1).

This is especially likely to occur if you are less than five years old.

This can be avoided by diligently rotating the cone to check for drips, but this is a labor-intensive process that is ripe for disruption through advanced in robotics and computer vision.

rotation-of-cone

Fig. 1: The ice cream cone looks safe (left), but if you rotate it 180º, it is revealed that the ice cream is about to drip onto you (right).

Proposal:

A glove lined with rollers and a set of tiny cameras can automatically rotate the ice cream cone in such a way that you will always be eating the ice cream sectors that are most likely to drip.

The glove is diagramed in Figure 2.

glove

Fig. 2: A glove with two motorized rollers to actually rotate the ice cream cone (highlighted in red) and a number of additional free-spinning rollers to allow the ice cream cone to spin freely. Not shown here is the computer vision component, which be integrated into the glove as miniature low-resolution cameras on the top of the index finger and thumb (to provide a 360° view of the ice cream under standard gripping conditions).

glove-with-cone

Fig. 3: The recommended glove-and-cone configuration for optimal application of the “ice cream glove.”

PROS: Prevents ice cream from dripping on you while you eat it. Saves mental energy that can be focused onto other tasks, such as promoting world peace.

CONS: Equipment malfunction may cause the rollers to spin out of control, “centrifuging” the ice cream scoop and flinging it everywhere.