This document discusses using near field communication (NFC) tags to provide serendipitous services. It defines serendipity as unexpected but desirable discoveries. The author proposes implementing serendipity services using NFC tags by recommending additional content based on tag context, user intentions, and touch history. A prototype matches rules to tag data and user profiles to generate serendipitous recommendations. The author argues serendipity services could motivate repeated tag touches and generate advertising revenue. NFC is better for serendipity than QR codes due to its ease of repeated touching. Serendipity may become a key design factor for successful NFC services.
Location Based Services von Volker Hoyer (Arvato/Bertelsmann) vom Kongress "The Future of E-Commerce", organisiert von Adtelligence in der Popakademie Mannheim. Weitere Informationen, Präsentationen und Videos auf www.adtelligence.de/futureofecommerce
From Juha Laurila who has been leading Nokia Research Center (NRC) in Lausanne since its establishment in spring 2008. Juha joined Nokia Research Center in 2000 and previously played various roles related to wireless systems research. He received PhD from Vienna University of Technology in 2000 and MSc from Helsinki University of Technology in 1995.
http://research.nokia.com/centers/lausanne/index.html
Location Based Services von Volker Hoyer (Arvato/Bertelsmann) vom Kongress "The Future of E-Commerce", organisiert von Adtelligence in der Popakademie Mannheim. Weitere Informationen, Präsentationen und Videos auf www.adtelligence.de/futureofecommerce
From Juha Laurila who has been leading Nokia Research Center (NRC) in Lausanne since its establishment in spring 2008. Juha joined Nokia Research Center in 2000 and previously played various roles related to wireless systems research. He received PhD from Vienna University of Technology in 2000 and MSc from Helsinki University of Technology in 1995.
http://research.nokia.com/centers/lausanne/index.html
인간과 인공지능·로봇이 함께 살아가는 시대가 다가오고 있습니다. 패러다임의 변화에 발맞춰 이슈를 보완하고 규제할 수 있는 방법도 고민할 시기입니다. 김경환 법무법인 민후 대표변호사는 2016년 12월 6일 국회서 '지능정보사회기본법(안)의 구성·내용과 과제를 주제로 발제하였습니다.
김경환 법무법인 민후 대표변호사는 2016년 12월 9일 국회에서 열린 '미래혁명 자율주행시대 해법은?'을 주제로 한 국회미래자동차포럼에서 '자율주행차 사회의 법적 과제'에 대해 발제하였습니다.
슬라이드는 우리나라법과 미국 캘리포니아주의 자율주행차 관련 입법 현황과 자율주행차의 정의 등을 시작으로 이에 대한 법적 과제가 제시되어 있습니다.
김경환 법무법인 민후 대표변호사는 2016년 12월 1일 국내 반도체 기업 보안담당 임직원을 대상으로 '중국의 산업보안(영업비밀) 법령과 구제수단'을 주제로 특강을 진행했습니다.
이는 최근 중국발 영업비밀침해 사례가 증가하고 국내 핵심인재가 중국기업으로 전직하는 등 영업비밀유출에 대한 우려가 높아짐에 따라 마련되었습니다. 김 변호사는 우리나라 부정경쟁 방지 및 영업비밀보호에 관한 법률과 중국의 반부정당경쟁법을 서로 비교하며 강의를 진행했습니다.
먼저 반부정당경쟁법에는 영업비밀에 대한 정의규정과 침해의 유형(제10조), 영업비밀 침해행위에 대한 법률적 책임(제20조, 제25조, 민사·행정 구제방안) 등에 대한 내용이 담겨있습니다.
[법무법인 민후] 빅데이터 실현을 위한 개인정보법령 개선방안(개인정보 비식별조치 가이드라인 포함)MINWHO Law Group
2016년 11월 21일 은행회관에서 열린 '제4차 산업혁명과 금융의 미래' 국제 컨퍼런스에서 김경환 법무법인 민후 대표변호사는 '빅데이터 실현을 위한 개인정보법령 개성방안'을 주제로 발제하였습니다.
현재 비식별화 가이드라인은 법적인 요소가 부족하며, 이를 해결하기 위해선 가이드라인이 아니라 법률 개정으로 풀어야 한다고 지적했습니다.
김경환 법무법인 민후 대표변호사는 2016년 11월 30일 대통령소속 국가지식재산위원회가 주최하는 '2016 국가지식재산네트워크 컨퍼런스'에 참석해 「4차 산업혁명과 지능정보사회에 대비한 입법과제」를 주제로 강연하였습니다.
이날 김 변호사는 4차 산업혁명으로 인해 우리가 경험할 사회, 그리고 거기에 발맞춘 정책과 규제, 입법방향 등에 대해 발표하였습니다.
특히 4차 산업혁명 사회 구현의 8대원칙과 이를 구현하기 위한 입법과제를 제시해 청중의 호응을 얻었습니다.
Accelerating Digital Transformation With Microsoft Azure And Cognitive ServicesThuan Ng
This presentation contains information relating to how Microsoft Azure can help small and large enterprises transform to digital. The presentation also covers set of Azure Cognitive Services and a demonstration with Text Analytics AP
Living Services respond by
wrapping around us, constantly
learning more about our needs,
intents and preferences, so
that they can flex and adapt to
make themselves more relevant,
engaging and useful. Consumers
demand this now as the standards
are being set by the best of
breed across the entirety of their
experiences, not restricted by
sector—hence liquid expectations.
MSPA Europe - How digital technology changes mystery shopping (nfc, ir, qr co...Laurent de Bernede
Best practices for implementing contactless technologies into a Mystery Shopping mobile application. Top 10 features needed for collecting data in the field. This presentation was presented by Laurent de Bernede at the MSPA Europe conference on May 14-16 2013.
IWMW 2000: Self Evident Applications for UniversitiesIWMW
Slides for the plenary talk on "Self Evident Applications for Universities" presented at the IWMW 2000 event held at the University of Bath on 6-8 September 2000.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2000/sessions.html#smart
인간과 인공지능·로봇이 함께 살아가는 시대가 다가오고 있습니다. 패러다임의 변화에 발맞춰 이슈를 보완하고 규제할 수 있는 방법도 고민할 시기입니다. 김경환 법무법인 민후 대표변호사는 2016년 12월 6일 국회서 '지능정보사회기본법(안)의 구성·내용과 과제를 주제로 발제하였습니다.
김경환 법무법인 민후 대표변호사는 2016년 12월 9일 국회에서 열린 '미래혁명 자율주행시대 해법은?'을 주제로 한 국회미래자동차포럼에서 '자율주행차 사회의 법적 과제'에 대해 발제하였습니다.
슬라이드는 우리나라법과 미국 캘리포니아주의 자율주행차 관련 입법 현황과 자율주행차의 정의 등을 시작으로 이에 대한 법적 과제가 제시되어 있습니다.
김경환 법무법인 민후 대표변호사는 2016년 12월 1일 국내 반도체 기업 보안담당 임직원을 대상으로 '중국의 산업보안(영업비밀) 법령과 구제수단'을 주제로 특강을 진행했습니다.
이는 최근 중국발 영업비밀침해 사례가 증가하고 국내 핵심인재가 중국기업으로 전직하는 등 영업비밀유출에 대한 우려가 높아짐에 따라 마련되었습니다. 김 변호사는 우리나라 부정경쟁 방지 및 영업비밀보호에 관한 법률과 중국의 반부정당경쟁법을 서로 비교하며 강의를 진행했습니다.
먼저 반부정당경쟁법에는 영업비밀에 대한 정의규정과 침해의 유형(제10조), 영업비밀 침해행위에 대한 법률적 책임(제20조, 제25조, 민사·행정 구제방안) 등에 대한 내용이 담겨있습니다.
[법무법인 민후] 빅데이터 실현을 위한 개인정보법령 개선방안(개인정보 비식별조치 가이드라인 포함)MINWHO Law Group
2016년 11월 21일 은행회관에서 열린 '제4차 산업혁명과 금융의 미래' 국제 컨퍼런스에서 김경환 법무법인 민후 대표변호사는 '빅데이터 실현을 위한 개인정보법령 개성방안'을 주제로 발제하였습니다.
현재 비식별화 가이드라인은 법적인 요소가 부족하며, 이를 해결하기 위해선 가이드라인이 아니라 법률 개정으로 풀어야 한다고 지적했습니다.
김경환 법무법인 민후 대표변호사는 2016년 11월 30일 대통령소속 국가지식재산위원회가 주최하는 '2016 국가지식재산네트워크 컨퍼런스'에 참석해 「4차 산업혁명과 지능정보사회에 대비한 입법과제」를 주제로 강연하였습니다.
이날 김 변호사는 4차 산업혁명으로 인해 우리가 경험할 사회, 그리고 거기에 발맞춘 정책과 규제, 입법방향 등에 대해 발표하였습니다.
특히 4차 산업혁명 사회 구현의 8대원칙과 이를 구현하기 위한 입법과제를 제시해 청중의 호응을 얻었습니다.
Accelerating Digital Transformation With Microsoft Azure And Cognitive ServicesThuan Ng
This presentation contains information relating to how Microsoft Azure can help small and large enterprises transform to digital. The presentation also covers set of Azure Cognitive Services and a demonstration with Text Analytics AP
Living Services respond by
wrapping around us, constantly
learning more about our needs,
intents and preferences, so
that they can flex and adapt to
make themselves more relevant,
engaging and useful. Consumers
demand this now as the standards
are being set by the best of
breed across the entirety of their
experiences, not restricted by
sector—hence liquid expectations.
MSPA Europe - How digital technology changes mystery shopping (nfc, ir, qr co...Laurent de Bernede
Best practices for implementing contactless technologies into a Mystery Shopping mobile application. Top 10 features needed for collecting data in the field. This presentation was presented by Laurent de Bernede at the MSPA Europe conference on May 14-16 2013.
IWMW 2000: Self Evident Applications for UniversitiesIWMW
Slides for the plenary talk on "Self Evident Applications for Universities" presented at the IWMW 2000 event held at the University of Bath on 6-8 September 2000.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2000/sessions.html#smart
Building Great Mobile Search with Productsy and Amazon CloudSearchMichael Bohlig
Presented by Sameer Maggon, Co-Founder of Productsy at the Bay Area Amazon CloudSearch Meetup, this talk summarizes the unique challenges of delivering great mobile search and summarizes the Productsy platform.
The search for new business ideas and new business models is hit-or-miss in most corporations
When good ideas do emerge, they’re often doomed because the company is organized to support one way of doing business and doesn’t have the processes or metrics to support a new one.
Overview of major factors in big data, analytics and data science. Illustrates the growing changes from data capture and the way it is changing business beyond technology industries.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Serendipity Paradigm in NFC-based Service by Kyoung Jun Lee of LoveisTouch
1. WIMA NFC 2012 @ Monaco
Serendipity Paradigm in NFC-Based
Service
Prof. Kyoung Jun Lee
School of Management, Kyung Hee University
klee@khu.ac.kr
Director of BMER.net (bmer.net)
Founder & CEO of
2. Serendipity: “Unexpected but desirable”
• An unexpected discovery of something worthwhile during a
search for an expected something worthwhile(Marcus Bach,
The World of Serendipity, 1980).
• Unexpected results, unexpected impacts, unexpected changes
of directions (Seeking Serendipity: The Paradox of Control,
McBirnie, 2008)
• The property of making fortunate discoveries while
looking for something unrelated, or the occurrence of
such a discovery during such a search.
3. Past Researches on Serendipity in IT
• N. Eagle, “Can Serendipity Be Planned?” MIT Sloan Management Review.
vol. 46, no. 1, Fall 2004, pp 10–14.
• Nathan Eagle, and Alex Pentland, "Social Serendipity: Mobilizing Social
Software," IEEE Pervasive Computing, vol. 4(2005), no. 2, 28-34
• Victoria Bellotti, Bo Begole, Ed H. Chi, Nicolas Ducheneaut, Ji Fang, Ellen
Isaacs, Tracy King, Mark W. Newman, Kurt Partridge, Bob Price, Paul
Rasmussen, Michael Roberts, Diane J. Schiano, Alan Walendowski,
“Activity-Based Serendipitous Recommendations with the Magitti Mobile
Leisure Guide”, CHI 2008 Proceedings, Florence, Italy, 2008
• Shigekazu Sawaizumi, Osamu Katai, Hiroshi Kawakami and Takayuki
Shiose, “Use of Serendipity Power for Discoveries and Inventions,” Studies
in Computational Intelligence, 2009, Vol 187, 2009, 163-169
• Abigail McBirni., “Seeking serendipity: the paradox of control,” Aslib
Proceedings: New Information Perspectives, Vol. 60(2008), 600~618.
4. Serendipity Services already on the Web
• Content Match Advertising: AdSense of Google
• SNS is also a serendipity service
– When we use facebook.com, we often luckily find out
an unexpected but useful information.
– Search cannot arouse the human needs. It assumes
the existing needs of human.
– SNS can arouse new human needs.
• Both are a kind of serendipity services already on
the web
6. Content Match Advertising: Example 2
Content on Woman Cancer
Ad on Women Clinic
Ad on Anticancer
기사 우측과 하단에
Chemotherapy
컨텐트 매치 광고 게재
7. Tag Match Advertising(Lee et al. 2007)
The AdSense in Ubiquitous Era !
Tag-Match Advertising exposes proper
ads to users through ‘Tag Match’, a new
process based on the information on
users and the information and contents
about tags
Lap Top A1-4524
1. Basic Information
2. After Service Request
3. Price Comparison
Related Products
1. Best Lap Top Briefcases 30
for Young Men”
2. Accessories
3. Similar Lap Tops
8. NFC Service Mindset or Paradigms
• Mission critical processes
– Payment by card emulation
• Fulfillment of user-expected services
• Lightweight serendipity service
9. Implementation of Serendipity Service
• Serendipity service may be implemented by
– Recommendation methodology using tag's
detailed location, tag touching time/frequency,
and the salient/designated feature of the tag
• Knowledge-based recommendation: our prototype
• Collaborative filtering: by mining users’ touch log
• Tag's detail location
– semantic location such as table, entrance, & board
etc.
– geographical location
10. Tag-App-Cloud Collaboration
• A physical tag connected with a semi-open mobile app and semi-
open tag management cloud can provide a series of virtual utility
services like:
– WiFi(SSID & passwd) Setting using the information in the cloud
– SNS-based 'like' and comments
– Attendance checking
– Couponing
– Social dating (e.g. girls near you)
– Tag match advertising
– CRM Services
• NFC services will be flourished by (semi-)open platform service
provider
• The NFC services will be complemented by Serendipity service
11. The Utility Tag Services & Serendipity
• The utility services will be synthesized by service
composition engine and accompanied by
serendipity engine.
• The satisfactory serendipity services will motivate
user's tag touching.
• The serendipity services will be new
window/media of online contents/commerce
providers
• NFC services will consist of offline utility services
and offline/online serendipity services.
12. Serendipity Services:
Outputs = f(inputs)
• Input 1: Tag's detail context
– Semantic & geographic location
• Input 2: User's understanding & intention
– salient/designated feature of the tag
• Input 3: Tag touching time/frequency,
• Output 1: Services fulfilling user's intention
• Output 2: Serendipity services by the
inference based on the context
13. Prototype Implementation
• Building serendipity rule base
– Currently we have 9 Rule Types
• Location -> Next Location
• Profile -> Person nearby
• Location -> Information near by (e.g. happy hour, flash sales)
• Location -> Information for the location
• Tagged Product -> Matched Product considering other users
• Tagged Product -> Additional information on the product itself
• Location(Space Tag)-> Product Recommendations within the space
• Location -> Transportation Information nearby
• Service Location -> Shopping information outside the space
– 40 Rules
• Serendipity case base construction by mining user's usage
data
14. Serendipity Engine
•사용자 행동 데이터DB
• •사용자 행동 데이터DB
Web Data 소셜그래프
•사용자간
• •사용자간 소셜그래프 데이터
Commerce Service
•웹에 등록, 게재되는
Serendipity • •웹에 등록, 게재되는 데이터
Service & Content DB
•사업자들의 상거래 Service User
Engine • •사업자들의 상거래
Tag Touch Log DB
•서비스
Serendipity Case Base
• •서비스
•콘탠트DB
• •콘탠트DB Rule Base
Serendipity
Response
• User Profile & Social Graph
Feedback
15. Revenue Generation through Serendipity Service
• Search useful information on behalf
User Expected of users and inform when it is relevant
(Intended) Service
+
Additional content
reflecting user’s
interest, usefulness, Advertising &
and freshness Commerce
NFC
Tag
16. Examples of Serendipity Rules
Data Type for Input Data Type for Recommendation
Current Location Time Next Location
Cafe Morning Restaurant
Restaurant Lunch Time Café for Dissert
Restaurant Dinner Time Pub or Karaoke
Pub Late Night Driving Service
Singing Room Late Night Driving Service
17. QR for Serendipity?
• NFC is largely different from QR codes with
respect to serendipity service.
• Serendipity service is impossible by QR-based
initiation because of its inconvenience in using
the tag
• For the frequent tagging, simple touch should be
guaranteed.
• Therefore serendipity service will be the unique
feature of NFC tags over that of QR codes
18. Serendipity Service Strategy
• When a user touches a tag three times within
an hour, how will you provide the services?
1. The same expected services only all the three
times
2. Sequentially improved services reflecting the
touching sequence
3. The same expected services with different
serendipity services
19. Paradigm Change?
Clearly defined vs. Secretly Serendipitous
• Can a pure serendipity tag be successful?
– The answer may be yes with NFC!
– No with QR
• These all come from the convenience of the
simple touching
• Serendipity as a design factor for NFC services
– Tags without serendipity might not make users touch
them anymore.
• Love may also come from (precisely designed but
not informed) serendipity!
20. What is the next after Web and App?
Tag
Touch
Serendipity
21. For More Information:
• Visit LoveisTouch.com
• Visit BMER.net
• Kyoung Jun Lee, Ph.D.
• Facebook.com/leekj007
• leekj007@gmail.com
• +82-10-3775-1952