SlideShare a Scribd company logo
1 of 10
Contextual Information Bo Begole, Ph.D. Ubiquitous Computing Computing Science Laboratory
confidential ,[object Object],Information and people always linked to each other thru context Information self-organizes for faster  retreival New context-enabled applications for vertical markets Better generic applications such as enterprise semantic search ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Harness content and context relationships to make knowledge use  much  easier People Content Tasks Events Places Topics
Contextual Intelligence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],email web plain text images audio office documents People Content Tasks Events Places Topics
Combine context data and cognitive models Activity model:  User goals, beliefs and desires Physical context Location, Time, Social context Behavior model Past actions (individual, population) Preference model Tastes, Interests, Expertise Electronic context Calendar, Calls, Email, Documents Advertising Community monitoring Information retrieval Spatial/Time patterns Time tracking Power savings Support of science Group default behavior Group coordination Better usability Health monitoring
Recommendation  service Consumer Local area Mobile device ,[object Object],[object Object],[object Object],[object Object],Trials in Japan, spring 2010  [ Nikkei Trendy Net ] Magitti: Activity-aware leisure guide Context:  Time, location, recent messages, etc.  Restaurants, stores, events, etc. Filter and rank  information items Infer activity Feedback Model preferences
Magitti demo video http://www2. parc . com/csl/groups/ubicomp/videos/magitti_project_demonstration . wmv
Recommendable items Restaurant reviews Store descriptions Parks descriptions Movie listings Museum events Magazine articles … Filtering and ranking Activity Utility Information What  you like ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Eat Buy See Do Read What you are doing now EAT Straits Cafe 0.77 EAT Fuki Sushi 0.64 SEE J. Gallery 0.60 EAT Tamarine 0.57 DO Sam’s Salsa 0.39 EAT Bistro Elan 0.38 BUY Apple Store 0.33 EAT Spalti 0.31
Levels of Contextual Intelligence email web pages plain text images audio forms office documents Systems observe typical action-in-context patterns and  deliver information that the user would not otherwise have known  to look for. Systems extract and present relationships discovered in information to  augment human sense-making . Users  manually  search, sort, sift and associate to find meaning and make sense Systems filter and sort information based on the user’s current context to  increase efficiencies of search and discovery . Contextual Intelligence
Industry analysts takes on  Contextual Intelligence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],-Forrester Smart Computing -Gartner, What’s in the Lab -IDC Software Predictions 2010
To subscribe to the PARC Innovations Update e-newsletter or blog and other feeds, or to follow us on Twitter, go to   www.parc.com/subscribe For more information, please contact: Bo Begole, Principal Scientist Bo. [email_address] .com Lawrence Lee, Business Development Lawrence. [email_address] .com

More Related Content

Similar to Contextual Information

Articulation
Articulation Articulation
Articulation
butest
 
Making light work of data- improving the UX of data rich interfaces- UX Austr...
Making light work of data- improving the UX of data rich interfaces- UX Austr...Making light work of data- improving the UX of data rich interfaces- UX Austr...
Making light work of data- improving the UX of data rich interfaces- UX Austr...
Stephen Hall
 

Similar to Contextual Information (20)

Elqano - Where Knowledge Finds People
Elqano - Where Knowledge Finds PeopleElqano - Where Knowledge Finds People
Elqano - Where Knowledge Finds People
 
Search Analytics for Fun and Profit
Search Analytics for Fun and ProfitSearch Analytics for Fun and Profit
Search Analytics for Fun and Profit
 
Articulation
Articulation Articulation
Articulation
 
Advance analytics -concepts related to drive into next wave of BI
Advance analytics -concepts related to drive into next wave of BIAdvance analytics -concepts related to drive into next wave of BI
Advance analytics -concepts related to drive into next wave of BI
 
Managing Electronic Resources for Public Libraries, Part 1
Managing Electronic Resources for Public Libraries, Part 1Managing Electronic Resources for Public Libraries, Part 1
Managing Electronic Resources for Public Libraries, Part 1
 
Search Solutions 2011: Successful Enterprise Search By Design
Search Solutions 2011: Successful Enterprise Search By DesignSearch Solutions 2011: Successful Enterprise Search By Design
Search Solutions 2011: Successful Enterprise Search By Design
 
Making light work of data- improving the UX of data rich interfaces- UX Austr...
Making light work of data- improving the UX of data rich interfaces- UX Austr...Making light work of data- improving the UX of data rich interfaces- UX Austr...
Making light work of data- improving the UX of data rich interfaces- UX Austr...
 
IxD meets DS
IxD meets DSIxD meets DS
IxD meets DS
 
Charting a Course Towards Intranet 3.0
Charting a Course Towards Intranet 3.0Charting a Course Towards Intranet 3.0
Charting a Course Towards Intranet 3.0
 
Why I Use SharePoint
Why I Use SharePointWhy I Use SharePoint
Why I Use SharePoint
 
Inteligent Catalogue Final
Inteligent Catalogue FinalInteligent Catalogue Final
Inteligent Catalogue Final
 
Taxonomy and seo sla 05-06-10(jc)
Taxonomy and seo   sla 05-06-10(jc)Taxonomy and seo   sla 05-06-10(jc)
Taxonomy and seo sla 05-06-10(jc)
 
Smart datamining semtechbiz 2013 report
Smart datamining semtechbiz 2013 reportSmart datamining semtechbiz 2013 report
Smart datamining semtechbiz 2013 report
 
Il stats workshop
Il stats workshopIl stats workshop
Il stats workshop
 
Commercial Ethnography Euro Ia 2008 Kalbach
Commercial Ethnography Euro Ia 2008 KalbachCommercial Ethnography Euro Ia 2008 Kalbach
Commercial Ethnography Euro Ia 2008 Kalbach
 
Team of Rivals: UX, SEO, Content & Dev UXDC 2015
Team of Rivals: UX, SEO, Content & Dev  UXDC 2015Team of Rivals: UX, SEO, Content & Dev  UXDC 2015
Team of Rivals: UX, SEO, Content & Dev UXDC 2015
 
Donna Maurer - Information architecture: a "how to"
Donna Maurer - Information architecture: a "how to"Donna Maurer - Information architecture: a "how to"
Donna Maurer - Information architecture: a "how to"
 
HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016HPE IDOL Technical Overview - july 2016
HPE IDOL Technical Overview - july 2016
 
Alternative Careers For Librarians
Alternative Careers For LibrariansAlternative Careers For Librarians
Alternative Careers For Librarians
 
Upgrade/Migration to SharePoint 2013 - How to get there (SPS SV)
Upgrade/Migration to SharePoint 2013 - How to get there (SPS SV)Upgrade/Migration to SharePoint 2013 - How to get there (SPS SV)
Upgrade/Migration to SharePoint 2013 - How to get there (SPS SV)
 

More from PARC, a Xerox company

Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
PARC, a Xerox company
 

More from PARC, a Xerox company (20)

Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
Enterprise Gamification – Exploiting People by Letting Them Have Fun [PARC Fo...
 
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening RemarksCCNxCon2012: Welcome: Event Kickoff & Opening Remarks
CCNxCon2012: Welcome: Event Kickoff & Opening Remarks
 
CCNxCon2012: Session 1: CCN Updates & Roadmap
CCNxCon2012: Session 1: CCN Updates &  RoadmapCCNxCon2012: Session 1: CCN Updates &  Roadmap
CCNxCon2012: Session 1: CCN Updates & Roadmap
 
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
 
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...CCNxCon2012: Session 2: DASH over CCN:  A CCN Use-Case for a SocialMedia Base...
CCNxCon2012: Session 2: DASH over CCN: A CCN Use-Case for a SocialMedia Base...
 
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
CCNxCon2012: Session 2: A Distributed Server-based Conference Control and Man...
 
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCNCCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
CCNxCon2012: Session 2: Embedding Cloud-Centric-Networking in CCN
 
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
CCNxCon2012: Session 2: Network Management Framework for Future Internet Scen...
 
CCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCNCCNxCon2012: Poster Session: FIB Optimizations in CCN
CCNxCon2012: Poster Session: FIB Optimizations in CCN
 
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a HierarchicalCCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
CCNxCon2012: Poster Session: Cache Coordination in a Hierarchical
 
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric NetworkingCCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
CCNxCon2012: Poster Session: Live Streaming with Content Centric Networking
 
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
CCNxCon2012: Poster Session:On a Novel Joint Replicating and Caching Strategy...
 
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
CCNxCon2012: Poster Session: Parallelizing FIB Lookup in Content-Centric Netw...
 
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
CCNxCon2012: Poster Session: ICN Architecture Evaluation — A Discussion on CC...
 
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
CCNxCon2012: Poster Session: A Backward-Compatible CCNx Extension for Improve...
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
 
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R NetworksCCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
CCNxCon2012: Session 3: NDN Applicability to V2V and V2R Networks
 
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and PepysCCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
CCNxCon2012: Session 3: Juxtaposition of CCN and Pepys
 
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar:  a Content Router for High Speed ForwardingCCNxCon2012: Session 4: Caesar:  a Content Router for High Speed Forwarding
CCNxCon2012: Session 4: Caesar: a Content Router for High Speed Forwarding
 
CCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFNCCNxCon2012: Session 4: OSPFN
CCNxCon2012: Session 4: OSPFN
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Precisely
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Contextual Information

  • 1. Contextual Information Bo Begole, Ph.D. Ubiquitous Computing Computing Science Laboratory
  • 2.
  • 3.
  • 4. Combine context data and cognitive models Activity model: User goals, beliefs and desires Physical context Location, Time, Social context Behavior model Past actions (individual, population) Preference model Tastes, Interests, Expertise Electronic context Calendar, Calls, Email, Documents Advertising Community monitoring Information retrieval Spatial/Time patterns Time tracking Power savings Support of science Group default behavior Group coordination Better usability Health monitoring
  • 5.
  • 6. Magitti demo video http://www2. parc . com/csl/groups/ubicomp/videos/magitti_project_demonstration . wmv
  • 7.
  • 8. Levels of Contextual Intelligence email web pages plain text images audio forms office documents Systems observe typical action-in-context patterns and deliver information that the user would not otherwise have known to look for. Systems extract and present relationships discovered in information to augment human sense-making . Users manually search, sort, sift and associate to find meaning and make sense Systems filter and sort information based on the user’s current context to increase efficiencies of search and discovery . Contextual Intelligence
  • 9.
  • 10. To subscribe to the PARC Innovations Update e-newsletter or blog and other feeds, or to follow us on Twitter, go to www.parc.com/subscribe For more information, please contact: Bo Begole, Principal Scientist Bo. [email_address] .com Lawrence Lee, Business Development Lawrence. [email_address] .com

Editor's Notes

  1. collect data about people’s every day lives. several data types (e.g., time, location, motion, computer use, cellphone use, object use, people nearby) several data sources (phones, computers, fixed infrastructure (security cameras, polycoms, etc.)) process this data. draw “higher level conclusions” such as place visited, activity performed, project worked on. exploit the data. e.g: help people find stores and restaurants they will like. help advertisers target better. help users coordinate with each other more easily. help epidemiologists understand disease sources. help enterprise workers automatically organize notes. ------------- Behavior -/ activity -aware systems: Just being aware of the situation is not sufficient Applications must behave appropriately in the situation - Models human behavior and activity (whereby “behavior” refers to a person’s actions or reactions, usually in relation to the environment, and can be conscious or unconscious, overt or covert, and voluntary or involuntary; while “activity” is a conscious, voluntary pursuit) - Enable applications that use context-aware data collection, with their primary value centers on the ability to infer, and potentially respond to, present behavior, instead of intent. Examples: - Consumer observation - Health monitoring - Elder care - Interruptibility modeling - In-situ information delivery - Security monitoring - “Contextual” reminders
  2. The fieldwork led to this general architectural vision. I’ll show you a more detailed View on the next slide, but I’d like you to understand the high-level picture first. As I mentioned at the start, our goal is to spontaneously provide appropriate recommendations. The system does this by determining both long-term preferences of genres of things that you like, and your immediate situation through Contextual data. From contextual data, the system estimates what activities You are likely to perform, filters and ranks the items in its database and returns To the client a useful list. When the user reviews the list, they may leave feedback, which is later used to Update their preferences. Now to explain how activity is represented, I have to go into a little more detail about The content recommender server
  3. Next, we rank each piece of content in the repository according to the likely utility of the content based on a model of the user's personal preferences which is generated from multiple sources: The user's explicitly stated preferences, The ratings they've made of items they've seen and done, The topics of documents and web pages they've looked at, And what the user has done in the past. This generates a utility score for each item which determines the ranking of each item in the interface.