Your SlideShare is downloading. ×
0
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Under Sousveillance: Personal Informatics & Techniques of the Self
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Under Sousveillance: Personal Informatics & Techniques of the Self

21,680

Published on

A talk for Defrag 2008. Just starting to think about all the great work people like Jones & Coates have been doing.

A talk for Defrag 2008. Just starting to think about all the great work people like Jones & Coates have been doing.

Published in: Technology, Design
4 Comments
15 Likes
Statistics
Notes
  • Great display. I've taken some of the structure graphics together with adapted to my startup
    Sharika
    http://winkhealth.com http://financewink.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hi! Nice presentation. Any chance you could post a list of all the examples/screenshots you have in the slide show? Some are more obvious than others...
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • I think young Matt is referring to the almost mindless and compulsive reloading and constant reviewing of stats he sees WP.com users engaged in.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • What does 'crack addled' mean?
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
21,680
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
93
Comments
4
Likes
15
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Under sousveillance: personal informatics & techniques of the self
  • 2. sr bna
  • 3. Are we too infatuated with the present?
  • 4. The past is not dead. Itʼs not even past.
  • 5. bullet time apps for data
  • 6. The strategic idea of the archive is a refreshed now.
  • 7. What happens when we help people make invisible life patterns visible?
  • 8. watching you watch yourself
  • 9. Blame Coates & Jones
  • 10. Clickstreams Location Taste data Status updates Social connections Photos/writing/bookmarking Financial data Email/phone/SMS/IM Smart objects External sources
  • 11. Where is the Kayak for my life?
  • 12. “People check their stats like crack addled gerbils.” Matt Mullenweg
  • 13. * Discovery * Wayfinding * Validation * Analytics * Documentation
  • 14. It should be ambient.
  • 15. It should be visual.
  • 16. It should be ubiquitous.
  • 17. It should create a dialog between the self and the group.
  • 18. “Information processing dissolving into behavior.”
  • 19. “Everyware is always situated in a particular context.”
  • 20. “The appeal of everyware is at some level universal.”
  • 21. Caveats: * Making explicit what was latent * Need to see the beautiful seams * Interconnection brings emergent, unexpected consequences * We donʼt know the privacy issues yet * Avoid the ʻset upʼ problem * Managing ongoing user expectations * Structure v. experimentation
  • 22. Many thanks to: http://www.flickr.com/photos/fiveinchpixie/527148477/ http://www.flickr.com/photos/heather/2904402/ http://www.flickr.com/photos/zoonie/27555176/ http://flickr.com/photos/toughkidcst/2959726563/
  • 23. brianoberkirch.com photo by Lane Hartwell

×