Browse Definitions :
Definition

personal drone

A personal drone, also known as a hobby or consumer drone, is an unmanned aerial vehicle (UAV) designed for the mass market.

In the past, UAVs have most often been associated with the military. However, recent technological advances have led to an increasing number of applications for drones in other industries as well as the consumer market.  Drones are used in a wide variety of endeavors including search and rescue, surveillance, traffic monitoring, weather monitoring, geographical mapping, agriculture and firefighting.

Besides the simple entertainment factor of remote-controlled vehicles, personal drones have in the past most often been used for still and video photography -- the devices can achieve vantage points that are difficult or impossible to access otherwise. Potential applications for personal drones include home security, child monitoring and the creation of virtual tours, among a great number of other possibilities. Programmable drones are expected to create a further market for specialized Mobile apps.

Drones are essentially flying robots. Their naturalization into the environment -- sometimes referred to as ubiquitous robotics -- is enabled by the combination of networking, robotics and artificial intelligence (AI).

Airspace is currently defined according to flight levels, and the level that drones fly at is mainly unregulated. Regulatory bodies, such as the Federal Aviation Administration (FAA), are working on legislation to control the personal and business use of drones.

See a Phantom V2 drone's flight over San Francisco:

See also: Amazon delivery drone, disruptive technology, disruptive innovation

This was last updated in December 2013

Continue Reading About personal drone

SearchNetworking
  • cloud-native network function (CNF)

    A cloud-native network function (CNF) is a service that performs network duties in software, as opposed to purpose-built hardware.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close