Browse Definitions :
Definition

Echo Show

The Echo Show is a smart speaker enabled with a 7-inch touchscreen by Amazon featuring Alexa, the company’s AI assistantAmazon introduced the Echo Show in May 2017.

Unlike most smart speaker designs, which are audio-only and driven by speech recognition, the Echo Show has a display and supports both audio and touchscreen input for Amazon’s AI assistant service. Essentially, the touchscreen makes the speaker more of a general-purpose computing device with advanced speech-recognition capabilities. The device ties into the Amazon marketplace to make purchases seamless for consumers and drive sales for the company.

The Echo Show includes an Intel Atom x5-Z8350, 2GB of RAM, 8GB of embedded flash memory, 802.11ac Wi-Fi and Bluetooth 4.1, an integrated video camera with microphone and a 21-watt sound system.

The device has raised privacy concerns because its built-in camera, microphone, voice recognition and constant connectivity mean that it could easily collect audio data from its environment. The Show is equipped with an external button to disable the intrusive devices for the sake of times users wish to ensure privacy. While the device is being hailed by many reviewers as the most compelling Alexa offering, some also admit to unplugging it for the sake of privacy.

Amazon introduces Echo Show:

This was last updated in July 2017

Continue Reading About Echo Show

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close