Browse Definitions :
Definition

porta-person

A porta-person is a device-based representation of an individual for teleconference applications. A porta-person may be a robot or a device that combines a PC or terminal with peripherals such as cameras, microphones and stereo sound systems. There are a number of applications for porta-people. For example, if a certain member of a conference group cannot be physically present at a meeting, a PC or terminal takes that member's place. The PC or terminal may be set down on the conference table at the spot the member would normally occupy.

Watch a brief porta-person demonstration.

The porta-person employs a high-speed Internet connection in conjunction with voice over Internet Protocol ( VoIP ) for transmitting the images and sound. At the member's actual location a panoramic display along with "surround sound" creates the virtual equivalent of the conference room. Some high-end porta-person systems employ mobile robot s that move around the meeting room, along with remote-control equipment at missing members' home offices. The porta-person concept, while workable for a small proportion of group members, becomes impractical if most or all of the members are unable to be physically present in the conference room.

The term porta-person was coined by Sun Microsystems although variants of the technology are in use by numerous corporations and institutions. Porta-person technology has potential applications beyond the corporate or institutional meeting room. For example, a porta-person can allow a sick child to attend school or provide companionship for shut-ins and hospital patients.

This was last updated in February 2007

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • spear phishing

    Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • bridge

    A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a ...

  • browser isolation

    Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close