This document discusses the history and future of context-aware technologies. It begins with a timeline of early context-aware tools and research projects. It then discusses the value of context awareness in mobile devices, with goals of adaptively delivering personalized information without increasing cognitive load. Key aspects are high-speed hybrid inputs, adaptive analytics, and distributed display methods. The document presents biological models like the brain's default mode network as an example. It envisions a future where phones act as hybrid sensors to underpin augmented reality, ubiquitous computing, and hyper-personalized services through constant context gathering and adaptive delivery of information.
Augmented reality is a technology that works on computer vision based recognition algorithms to augmented sound, video, graphics and other sensor based inputs on real world objects using camera of your device.
Augmented Reality (AR) will be the next mobile computing platform, seamlessly merging the real world with virtual objects to support realistic, intelligent, and personalized experiences. Making this vision possible requires the next level of immersion, artificial intelligence, and connectivity within the thermal and power envelope of a wearable glasses.
Learn more at: https://www.qualcomm.com/invention/cognitive-technologies/immersive-experiences/augmented-reality
Augmented reality is a technology that works on computer vision based recognition algorithms to augmented sound, video, graphics and other sensor based inputs on real world objects using camera of your device.
Augmented Reality (AR) will be the next mobile computing platform, seamlessly merging the real world with virtual objects to support realistic, intelligent, and personalized experiences. Making this vision possible requires the next level of immersion, artificial intelligence, and connectivity within the thermal and power envelope of a wearable glasses.
Learn more at: https://www.qualcomm.com/invention/cognitive-technologies/immersive-experiences/augmented-reality
Mika Saastamoinen: Spatial computing - extending reality. Presentation at Kela Conference on Social Security 2019 – Equality and wellbeing through sustainable social security system, 10.12.2019.
Ubiquitous computing is one of the most prodiously growing topic which will be covering all facets of life.In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is considered an advancement from the older desktop paradigm. More formally, ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs".
Come ogni nuova convergenza tecnologica l''Augmented Reality ridefinisce l'esperienza del corpo attraverso lo spazio e lo spazio attraverso i codici. Il buzz che circonda l'AR individua oggi un punto di convergenza tra tecnologie mature, sovraccarico delle potenzialità del presente.
Presentation for Handheld Librarian 3 as an intro to augmented reality services including what's happening in the fields of advertising, marketing, retail, shipping, gaming, and the wealth of GIS information overlay currently available. Social issues are briefly covered as well.
Ubiquitous Computing Applications
Outline
Ubiquitous Computing
Virtual Reality
Augmented Reality
Information and Data Visualization.
What is ubiquitous computing?
Any computing technology that permits human interaction away from a single workstation.
This includes
pen-based technology,
handheld or portable devices,
large-scale interactive screens,
voice or vision technology.
Human-centered vision with these technologies presents many challenges. Here we Focus
defining the appropriate physical interaction experience;
discovering general application features;
theories for designing and evaluating the human experience within ubiquitous computing.
Scales of devices
Mark Weiser proposed three basic forms for ubiquitous system devices:
Inch
Foot
Yard
Implications for device size as well as relationship to people.
Mark Papermaster, Senior Vice President & Chief Technology Officer, AMD, presentation from Dell World on Surround Computing: The Future of Work & Play. Discover how gesture recognition, photo indexing, and visual and audio search will become the new workloads that enable unprecedented levels of productivity.
Ubiquitous Computing - The Future of ComputingShiraz Shrestha
Ubiquitous Computing is a technology that interlinks physical and digital world together. It aims to do so by embedding microprocessors in devices of various forms including laptops, tablets and in everyday objects such as fridge, tables, pair of glasses, etc. The basic idea behind Ubiquitous Computing is to embed chips in almost any devices, from clothing to tools to appliances to cars to homes to kitchens to the human body to connect it to an infinite network of other devices.
This slide deals with ubiquitous computing, the eras of computing, generic features of ubiquitous computing like natural interfaces, context-aware learning and automated capture and access to live experiences, related areas of ubiquitous computing like ambient intelligence, augmented reality, wearable computing, how it has changed the way humans interact with the computers and the future of computing.
User Interfaces and User Centered Design Techniques for Augmented Reality and...Stuart Murphy
We chose to explore virtual and augmented reality (VR and AR) due to its recent emergence into the mainstream areas of gaming, mobile applications and various other systems. We felt it important to distinguish between VR and AR in both areas of interaction design and user interface evaluation and creation techniques. As it is a topic of great passion for us we wanted to instill the possibilities that this medium has to offer for interaction designers and UI developers.
Mika Saastamoinen: Spatial computing - extending reality. Presentation at Kela Conference on Social Security 2019 – Equality and wellbeing through sustainable social security system, 10.12.2019.
Ubiquitous computing is one of the most prodiously growing topic which will be covering all facets of life.In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is considered an advancement from the older desktop paradigm. More formally, ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs".
Come ogni nuova convergenza tecnologica l''Augmented Reality ridefinisce l'esperienza del corpo attraverso lo spazio e lo spazio attraverso i codici. Il buzz che circonda l'AR individua oggi un punto di convergenza tra tecnologie mature, sovraccarico delle potenzialità del presente.
Presentation for Handheld Librarian 3 as an intro to augmented reality services including what's happening in the fields of advertising, marketing, retail, shipping, gaming, and the wealth of GIS information overlay currently available. Social issues are briefly covered as well.
Ubiquitous Computing Applications
Outline
Ubiquitous Computing
Virtual Reality
Augmented Reality
Information and Data Visualization.
What is ubiquitous computing?
Any computing technology that permits human interaction away from a single workstation.
This includes
pen-based technology,
handheld or portable devices,
large-scale interactive screens,
voice or vision technology.
Human-centered vision with these technologies presents many challenges. Here we Focus
defining the appropriate physical interaction experience;
discovering general application features;
theories for designing and evaluating the human experience within ubiquitous computing.
Scales of devices
Mark Weiser proposed three basic forms for ubiquitous system devices:
Inch
Foot
Yard
Implications for device size as well as relationship to people.
Mark Papermaster, Senior Vice President & Chief Technology Officer, AMD, presentation from Dell World on Surround Computing: The Future of Work & Play. Discover how gesture recognition, photo indexing, and visual and audio search will become the new workloads that enable unprecedented levels of productivity.
Ubiquitous Computing - The Future of ComputingShiraz Shrestha
Ubiquitous Computing is a technology that interlinks physical and digital world together. It aims to do so by embedding microprocessors in devices of various forms including laptops, tablets and in everyday objects such as fridge, tables, pair of glasses, etc. The basic idea behind Ubiquitous Computing is to embed chips in almost any devices, from clothing to tools to appliances to cars to homes to kitchens to the human body to connect it to an infinite network of other devices.
This slide deals with ubiquitous computing, the eras of computing, generic features of ubiquitous computing like natural interfaces, context-aware learning and automated capture and access to live experiences, related areas of ubiquitous computing like ambient intelligence, augmented reality, wearable computing, how it has changed the way humans interact with the computers and the future of computing.
User Interfaces and User Centered Design Techniques for Augmented Reality and...Stuart Murphy
We chose to explore virtual and augmented reality (VR and AR) due to its recent emergence into the mainstream areas of gaming, mobile applications and various other systems. We felt it important to distinguish between VR and AR in both areas of interaction design and user interface evaluation and creation techniques. As it is a topic of great passion for us we wanted to instill the possibilities that this medium has to offer for interaction designers and UI developers.
Context is King: AR, AI, Salience, and the Constant Next ScenarioClark Dodsworth
Clark Dodsworth’s AREvent talk, Santa Clara, CA June 3, 2010: "Context is King: AR, AI, Saience, and the Constant Next Scenario" Mostly about smartphone AR as a gateway to context aware computing becoming indispensible.
The UX of Tomorrow: Designing for the Unknown by Jeff FeddersenOxford Tech + UX
MIT Enterprise Forum of NYC hosted The UX of Tomorrow: Designing for the Unknown on June 4th, 2015 at Shutterstock featuring Beverly May, Ryan Gossen, Jay Vidyarthi, and Jeff Feddersen. This is Jeff's presentation from the event.
Trained in computer science and music, Jeff works with software and hardware to make computers do new and unusual things. He is currently part of a team developing a sculptural reflection of energy and resource flows in what is being heralded as the world`s greenest office building. His work for groups ranging from the Hayden Planetarium and the Connecticut Science Center to Sony and HBO has resulted in award-winning public interactive experiences.
Jeff teaches at NYU`s graduate Interactive Telecommunications Program, where he has a residency to develop video curricula supporting physical computing and energy. His novel musical instruments and kinetic sound sculptures have been performed on and exhibited internationally, and he is the co-inventor of an electronic wind instrument based on the Japanese shakuhachi (US patent #7723605).
The next ten years of technology will see many of Ray Kurzweil`s predictions come alive: Embedded, invisible, unwired electricity and internet-based interactions will drive every aspect of our lived environment. The physical and digital worlds are merging, powered by incredible changes in computing, universal connectivity as well as Artificial Intelligence (AI) and machine learning. This pending wave is certain to change every aspect of our human-computer interaction.
Major technological leaps present interesting design and UX challenges and require a wholesale shift in perspective by designing for the as-yet unknown. Screens, keyboards, and mouse dominated yesterday and today. Tomorrow, these systems will be initiated, controlled, and tracked through location and environment, semantic context, a wave of the arm, a blink of an eye, a directed gaze, a heartbeat, a crowd-driven trend, even a brainwave.
Whole new approaches and design systems need to be considered for what the next wave of products do, what they look and feel like, and how they can be more meaningful, useful, relevant, and intuitive.
This talk discussed the UX of tomorrow for the next wave of product design based on some of the very first products and services on the market that hint at the integrate
The digital world is facing a crisis that has at the same time opened new windows of opportunity. To tackle the shortage of potential leaders joining the digital sector, the Schaffhausen Institute of Technology (SIT) has crafted a new course: Masters of Science (MSc) in Computer Science and Software Engineering – to better prepare graduates for leadership roles, specifically within the IT and Science disciplines.
At the #SITinsights in Technology talk, we’re blending computing and economics, bringing knowledge and expertise from all relevant fields to help enable global efforts.
About Schaffhausen Institute of Technology:
With its pioneering curriculum, the Schaffhausen Institute of Technology (SIT) offers a new model of education. Focusing on the most important areas of technology, SIT will drive research, development and innovation in a next generation learning and research environment. Using state-of-the-art facilities, SIT's students, researchers and business allies will address large-scale world problems by developing a technology curriculum based on global issues.
This is a version of series of talks given at NCSA-UIUC's director seminar, IBM Almaden, HP Labs, DERI-Galway, City Univ of Dublin, and KMI-Open University during Aug-Oct 2010 (replaces earlier keynote version). It deals with couple of items of the vision outlined at http://bit.ly/4ynB7A
A video of this presentation: http://www.ncsa.illinois.edu/News/Video/2010/sheth.html
Link to this talk as http://bit.ly/CHE-talk
SIT is proud to be part of the global movement in confronting COVID-19 by moving some SIT operations into an online format.
At the #SITinsights in Technology talk, we’re blending computing and economics, bringing knowledge and expertise from all relevant fields to help enable global efforts.
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago
All slides from the January 7th 2015 CloudCamp Chicago
Theme: "the guts of the cloud"
What happens when the cloud meets the ground? Where does your data live, and who can touch your servers? We'll look at the "guts" of the cloud, from datacenters to fiber and from servers to switches in real life.
Lightning Talks:
"Cloud Computing: A look under the hood of the next-gen cloud" - Bill Kleyman, Director of Strategy and Innovation at MTM Technologies @QuadStack
"Cloudy with a 100% chance of GigaWatts" - Russell Pease, Business Development Manager at CyrusOne Data Centers
"The Importance of the Network Enabled Cloud" - Ron Zirkin, Enterprise Account Manager at XO Communications @ronzirkin
"The Red Hat OS1 Cloud: You want guts?" - Dan Yocum, Principal Systems Engineer at Red Hat @yocum137
The quest for realizing Smart Environments has taken place for the last 30 years. Diverse adaptations of the original UbiComp vision have been developed, each highlighting diverse aspects who have been considered critical to enable a wider and more acceptable adoption of Smart Environments. Notable examples of such interesting adaptations are Context-aware Computing, Sentient Computing, Ambient Intelligence, Ambient Assisted Living and Internet of Everything. Under those different umbrella terms, researchers have explored the 3 stage enabling equation for Smart Environments, i.e. “SENSE + PROCESS = ACT”, i.e. spaces where the environment is aware of the needs, profiles and preferences from the sensed users and accommodates its behaviour to ease their daily interactions. Contributions around these different perspectives and applied to distinct environments, i.e. Smart Offices, Smart Homes, Smart Factories or Smart Cities, have been produced, all addressing the challenges posed by ever more complex systems of systems populated by multiple users. This talk will exemplify research results on how to accomplish these three core steps. Firstly, in the SENSE part, the importance of location sensing and the spread of low cost highly dense sensing environments (RFID, NFC or low range Bluetooth) will be described. Secondly, the PROCESS stage where ever more sophisticated analytics mechanisms to take into account historic and real-time data are considered, combining domain-driven (rules) and data-driven solutions, will be analysed. Thirdly, the ACT stage will be explored, considering the evolution from reactive to learning persuasive environments which aim to collaborate with their users. Thus, a middle ground fostering collaboration between smart things and people will be defended giving place to Smarter environments. The implications of the Smarter environments approach will be illustrated with use cases in the Open Government and Efficient Energy Management domains.
SIT launches its first Master program in Computer Science and Software engineering.
Start in September and apply now.
Master in Computer Science and Software Engineering
The program is flexible and really adapted to the needs of industry. It is available both onsite in Switzerland and in an online offering. We offer attractive scholarships for qualified students and it is also possible to have your second year in one of our partner universities in Europe, USA and Asia.
About Schaffhausen Institute of Technology:
With its pioneering curriculum, the Schaffhausen Institute of Technology (SIT) offers a new model of education. Focusing on the most important areas of technology, SIT will drive research, development and innovation in a next generation learning and research environment. Using state-of-the-art facilities, SIT's students, researchers and business allies will address large-scale world problems by developing a technology curriculum based on global issues.
This presentation is designed to help developers think about the future of mobile app development and in the absence of firm standards, offers tips for choosing a pervasive software architecture for the Internet of Things, also known as M2M, the Connected World, Pervasive Applications, or Ubiquitous Computing.
Similar to Clark Dodsworth - Presentation at Emerging Communications Conference & Awards (eComm 2011) (20)
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
4. Alfred North Whitehead-(1861-1947)First context-aware tools theorist “Civilization advances by extending the number of important operations which we can perform without thinking of them.” ------ …Context-aware services shouldn’t spike cognitive load.
5. Context Awareness Timeline Efficient power usage Context-aware tools begin todisappear. CALO project Commercial aviation HUD 1st car HUD:Cutlass Supreme 1st Context Awareness paper Rear-view mirrors Sailboat tell-tales US DoD air-combat testing “Augmentedenvironments,” sensor nets Startups & Acquisitions Secretary invented Siri founded Now 2013 ~1900 1970s 1974-8 1988 1992+ 2003 2007 1994 ? Prehistory, soon after invention of the sail. Horse carriages Schilit, Theimer, Want, & Adams Tom Caudell &David Mizell “UbiComp”:Mark Weiser Sutherland/Sproull, ‘68: 1st HMDs Hands-up displays
6. The Value of Now Contextual data Constantscenariosupport = + A.I.
7. Reasons for Context Aware Mobile 1. Diversity of use cases / user. 2. User attention = scarce resource. Tool should learn the user. Context awareness manages datadelivery:What,when, how much,what modality, what priority. ------------------------------------------------------- Especially when not-to.
8. Goal of Context Aware Mobile Adaptively deliver info, hyper-personalized via n dimensions of user + environment states, with high space/time precision, without spiking your cognitive load. Context + Personal Salience = Value
11. The most important rule we can import from biology:Nature is Always On.The 2nd most important rule:Hybrid sensing & hybrid response.
12. The hardware emulation: Your phone is the hybrid Master Sensor for your life; everyone else’s phones help, all the time. Together, they’re the platform for: ) Augmented Reality Pervasive computing Context awareness Semantic Web Ubicomp&sensornets Ambient Intelligence Things that Think Internet of Things & Hyper-personalized services… )
13. Human Context-Aware Model: The Brain’s Default Mode Network • Active only when the brain is notfocused on a particular task • 2 linked brain areas: Empathy re: intent of others,-+ your own state awareness Personal memories + visualization of future scenarios Scenario modeling State & intent awareness Brain photo: Omikron/photoresearchers Network overlay: Olaf Sporns/Indiana Univ. (modified by J. Korenblat)
14. “It’s all about long-term, sustaining relationships.” -Alan Kay (2009), on the trend toward a service-based model. Context Aware Services: long-term, sustaining,contextuallydynamic, hyperpersonalized-relationships between users & info services.
15. Context Gathering • Constant autodiscovery of data feeds & sensor feeds. • Constant 2D & 3D feature I.D. and object recognition. • Constant motion analysis + evaluation linked to object recognition. • Constant indoor mapping, 2D & 3D: Ultrasonic& IR-sensing for position, spatialanalysis & modeling. • Integrated gesture & speech recognition, plus voice ID. • Constant audio + visual logging with visual & semantic tags.
16. Context-Driven Use Case Entertainment Any licensed character: a useful buddy, a delivery method on top of context-aware, locational, hyper-personalized services. The character behavior, persona, & animation: Character Skin.
18. The Ad Hoc Value of Now Ad hoc P2P mobile sensor networks, constantly re-forming and informing each other. In each locale: • Pooling realtime data • Stored only in the swarm • Hand-off & erase upon exiting • Short-distance wireless • No use of cloud or carriers • Data tied to location • Every phone • Every moment Duration of data retention on any device: A function of # of devices transiting the defined area.
26. Context-driven Use Case: Entertainment First rule of theme parks: You bring the fun in with you - your friends-& family. • The attractions you pay for aren’t the experience. • Now, a new type of friend. For as long as you want. A licensed character becomes a useful buddy, a delivery method for context-aware, locational, hyper-personalized services. c. Lynne LaCascia, all rights reserved
27. Context-Aware Biological Model: The Brain’s Default Mode Network Functions of consciousness: 1) Constantly evaluate surroundings (physical + human) 2) Constantly judge salience of each aspect of current situation in context of your needs 3) Constantly construct scenarios for next step Parallel function of context-aware devices: Assess, select, shape, & deliver salient data (Device awareness augments user’s awareness) History+current state= basis of decision for next state
41. Schilit, Bill.; Adams, Norman; Want, Roy. Context-Aware Computing Applications. 1st International Workshop on Mobile Computing Systems and Applications. (1994) 85-90
For good context aware services, using our phone to both gather and deliver data, …We need to be sensing, sorting, and prioritizing many dimensions of personal context simultaneously -- physical proximities, time proximities, and all the daily priorities of your life. Then we need predictive ability to estimate what key elements of that data may be so important to you that you’ll want to know, NOW.Finally, we need the awareness of what you are doing, in what sort of physical environment and with whom, to be able to decide how best to deilver you the information. Could be audio, could be tactile, could be an alert followed by looking at a screen. But it’s VERY important that your device be able to deliver that data in the optimum medium at the right momemt to you, in a useful amount of detail, and NOT at the wrong time.To do this, it needs to learn you. A lot about your habits plans, and preferences, in a lot of layers. And it’s going to be another big, profitable facet of the disruptive impact of our mobile digital tools. Context aware tools need broadband highly parallel multimodal data sensing Fast powerful analyticsAnd hybrid means of delivering their conclusions to you, methods that constantly adapt to what’s best for you in the moment..
Fortunately we have models…for broadband data gathering, alertness, for anomaly identification and threat analysis, and for processing that information.Nature has been developing ways to simultaneously attend to many dimensions of one’s immediate environment, discard the irrelevant data, prioritize what’s left, and decide what to do NEXT, very quickly. We already do it ourselves. It’s called the Default Mode Network of the brain. Whenever we’re not on a task, it’s constantly evaluating our current situation, compariing it to all the history we’ve ever had, and deciding what possible things might be best to do next. We just need to find ways to do that with hardware. That’ll help a lot.
Many apps that haven’t even been developed yet will have to move into the OS, always functioning.Much more sensing must be going on, all the time. Your phone needs to know the shape of the room you’re in, how many light sources and people there are in it, who the people are, what trace elements are in the atmosphere, and how that changes over time, and Compared to the biological models, our tools are at a disadvantage; our emotions, for example, are adept at automatically finding important patterns based on our experience, and driving our reactions before we even know what’s happening, but tools need to calculate and approximate that --- very difficult. Then they need to be able to respond and notify us in ways that aren’t irritating, and that definition changes frequently every day. Big task, huge payoff.