SlideShare a Scribd company logo
Ubiquitous Computing and AmI Smart
Environments
(From Human Computer Interaction to Human
Environment Interaction)
Joseph Howerton
HCI 594 - Professor Adam Steele
DePaul University
11/29/2011
The Evolving Information Society
• Major advancements in the Internet and
smart devices over the last two decades.
• Societies appear ready to adopt new
technology hardware and application
advances just as fast as they emerge.
• The result is profound advancements in
the way humans communicate and
interact.
Three major waves in computing
• First Wave was many people per
computer.
• Second Wave was one person per
computer.
• Third Wave will be many computers per
person. Also called The Now Economy.
Three major waves in computing
The concept of Moore’s Law
• Says that the number of transistors that
can be placed inexpensively on an
integrated circuit doubles approximately
every two years (or 18 months).
• Result. Computing devices continue to
become more and more miniaturized,
while increasing in computing power and
wireless connectivity.
Ubiquitous Computing (UbiComp)
• Mark Weiser, The Father of UbiComp, coined
the term “ubiquitous computing” in his seminal
article,The Computer For The 21st
Century,
Scientific American, September 1991.
• Weiser asserts that, “the most profound
technologies are those that disappear. They
weave themselves into the fabric of everyday life
until they are indistinguishable from it.
What is UbiComp?
• Ubiquitous Computing pre-supposes the
idea that:
• “machines should fit into the human
environment, instead of forcing humans to
enter into the machine’s environment.”
What is UbiComp?
• Embedded: many networked devices are
integrated into the everyday objects in any given
environment.
• Context aware: these devices can recognize you
and your situational context.
• Personalized: they can be tailored to your
needs.
• Adaptive: they can change in response to you.
• Anticipatory: they can anticipate your desires
without conscious mediation.
Weiser’s Vision
• “We are therefore trying to conceive a new
way of thinking about computers, one that
takes into account the human world and
allows the computers to vanish into the
background.” Mark Weiser
Ambient Intelligence (AmI)
(A new computing paradigm)
• A result of the increasing demand for
ubiquitous and continuous access to
information and services.
• AmI refers to “electronic environments that
are sensitive and responsive to the
presence of people.”
The Roots of AmI
• “AmI refers to a multi-disciplinary area of
research and development which
embraces a variety of pre-existing fields of
computer science as well as engineering.”
• AmI brings together all of these resources
to provide flexible, intelligent services to
users acting in their environments.
The Roots of AmI
• AmI was first proposed by the consumer
electronics company Philips in the late 1990s “as
a novel paradigm for consumer electronics that
are sensitive to, and responsive to, the presence
of people.”
• Philips’ HomeLab initiative, which was an
advanced lab designed to conduct usability and
feasibility studies in AmI that officially opened in
2002.
The Roots of AmI
• This was accomplished first in the home
lighting market, where lighting “systems”
would turn on with the presence of people,
or outdoor lights that turn on when the
environment turns dark.
The Roots of AmI
• The EU’s Information Society
Technologies Program Advisory Group
(ISTAG) “used the term Ambient
Intelligence (AmI) to describe a vision
where people will be surrounded by
intelligent and intuitive interfaces
embedded in everyday objects and
environments.”
The Vision of AmI
The AmI Paradigm Shift
“The AmI paradigm differs in two major ways from
the previous two waves of computing.”
• “The user interface has become reactive, that is
actions are not explicitly requested but are the
result of the mere presence of people or their
avatars.”
• “The meaning of computation can no longer be
associated to a single device or a set of
connected devices, but is located in the
collection of devices.”
The foundations of AmI “Smart
environments”
• Integration of sensing capabilities
• Processing power
• Reasoning mechanisms
• Networking facilities
• Applications and services
• Digital content
• Actuating capabilities (to be distributed in
the surrounding environment)
AmI Smart Objects
• Environment characterized by invisible,
embedded computational power in
everyday devices and appliances.
• Augmenting the physical properties and
affordances of artefacts with the potential
of computer-based support, i.e. creating
“Smart Objects.”
The Constructs of AmI Smart
Environments
Social Challenges and
Implications
• A world filled with AmI all knowing, all
reporting objects.
• Comprehensive monitoring and
surveillance.
• Total market transparency.
• How much privacy are we willing to trade
to achieve increased productivity.
Social Challenges and
Implications
• A world filled with AmI all knowing, all
reporting objects.
• Comprehensive monitoring and
surveillance.
• Total market transparency.
• How much privacy are we willing to trade
to achieve increased productivity.
Social Challenges and
Implications
• A world filled with AmI all knowing, all
reporting objects.
• Comprehensive monitoring and
surveillance.
• Total market transparency.
• How much privacy are we willing to trade
to achieve increased productivity.
Privacy
• “Privacy is the claim of individuals, groups,
or institutions to determine for themselves
when, how, and to what extent information
about them is communicated to others.”
Alan Westin
Acceptance and Adoption
• Acceptance and adoption of AmI Smart
Environments will be founded in trust and
privacy.
• This will remain a paramount action item
for proponents of emerging AmI
landscapes.
Conclusion
This question is addressed to UI and UX
designers, as well as current and budding
HCI professionals.
• Will we address the impending pitfalls to
AmI early in the design phase in order to
shape the envisaged systems according
to fundamental social and ethical
requirements?

More Related Content

What's hot

Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Abhinav Wagadre
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Pragya Srivastava
 
Operating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous ComputingOperating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous Computing
Isuru Abeywardana
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
Honeyson Joseph
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
Hamza Malik
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
Hongseok Kim
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
u065932
 
Ubiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of ComputingUbiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of Computing
Shiraz Shrestha
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
BhaktiKarale
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Daniel Kornev
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
Arpan Patel
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Aashish Jain
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Kelly Zhang
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Vashira Ravipanich
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
Vishwajeet Vatharkar
 

What's hot (20)

Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Operating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous ComputingOperating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous Computing
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
 
Ubiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy IssuesUbiquitous Computing: Privacy Issues
Ubiquitous Computing: Privacy Issues
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of ComputingUbiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of Computing
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 

Viewers also liked

Sure you're killing it as a product manager but are you happy (ProductCamp Bo...
Sure you're killing it as a product manager but are you happy (ProductCamp Bo...Sure you're killing it as a product manager but are you happy (ProductCamp Bo...
Sure you're killing it as a product manager but are you happy (ProductCamp Bo...
ProductCamp Boston
 
Applying Game Concepts To Learning
Applying Game Concepts To LearningApplying Game Concepts To Learning
Applying Game Concepts To Learning
University of West Florida
 
Skp global expansion updates-February 2016
Skp global expansion updates-February 2016Skp global expansion updates-February 2016
Skp global expansion updates-February 2016
Partha Pant
 
Grafico diario del dax perfomance index para el 11 06-2012
Grafico diario del dax perfomance index para el 11 06-2012Grafico diario del dax perfomance index para el 11 06-2012
Grafico diario del dax perfomance index para el 11 06-2012
Experiencia Trading
 
Show Musical São Paulo - Dinardi Junior
Show Musical São Paulo - Dinardi Junior Show Musical São Paulo - Dinardi Junior
Show Musical São Paulo - Dinardi Junior
Fabíola Maria Carnevalli
 
Question C IE
Question C IEQuestion C IE
Question C IE
AlejandroRoldan92
 
Malaria
MalariaMalaria
Malaria
burlau voy
 
バズ・オブ・ビアマジ21
バズ・オブ・ビアマジ21バズ・オブ・ビアマジ21
バズ・オブ・ビアマジ21
stucon
 
Catalogue of stone coated roofing sheets from SGB-China
Catalogue of stone coated roofing sheets from SGB-ChinaCatalogue of stone coated roofing sheets from SGB-China
Catalogue of stone coated roofing sheets from SGB-China
Andy Zhang
 
Grafico diario del dax perfomance index para el 13 07-2012
Grafico diario del dax perfomance index para el 13 07-2012Grafico diario del dax perfomance index para el 13 07-2012
Grafico diario del dax perfomance index para el 13 07-2012
Experiencia Trading
 
03 agency pres sensors - jesper rhode pdf
03 agency pres sensors - jesper rhode pdf03 agency pres sensors - jesper rhode pdf
03 agency pres sensors - jesper rhode pdf
Mobile Marketing Association
 
The Architecture of Continuous Innovation - OSCON 2015
The Architecture of Continuous Innovation - OSCON 2015The Architecture of Continuous Innovation - OSCON 2015
The Architecture of Continuous Innovation - OSCON 2015
Chip Childers
 
Magical Mouse Schoolhouse: Tom Sawyer Island
Magical Mouse Schoolhouse: Tom Sawyer IslandMagical Mouse Schoolhouse: Tom Sawyer Island
Magical Mouse Schoolhouse: Tom Sawyer Island
Jodi Whisenhunt
 
Why use a contractor
Why use a contractorWhy use a contractor
Why use a contractor
Niomi Cowling
 
MHS Alumna Becomes White House Social Secretary
MHS Alumna Becomes White House Social SecretaryMHS Alumna Becomes White House Social Secretary
MHS Alumna Becomes White House Social Secretary
Milton Hershey School
 
NBA All-Time Starting Five
NBA All-Time Starting FiveNBA All-Time Starting Five
NBA All-Time Starting Five
Ryan C Heffernan
 
Be phenomenal 21 key success factors for leaders & managers
Be phenomenal 21 key success factors for leaders & managersBe phenomenal 21 key success factors for leaders & managers
Be phenomenal 21 key success factors for leaders & managers
Learningade
 
Creating Documentation With A Wiki: The DITA Storm Project
Creating Documentation With A Wiki: The DITA Storm ProjectCreating Documentation With A Wiki: The DITA Storm Project
Creating Documentation With A Wiki: The DITA Storm Project
Scott Abel
 

Viewers also liked (18)

Sure you're killing it as a product manager but are you happy (ProductCamp Bo...
Sure you're killing it as a product manager but are you happy (ProductCamp Bo...Sure you're killing it as a product manager but are you happy (ProductCamp Bo...
Sure you're killing it as a product manager but are you happy (ProductCamp Bo...
 
Applying Game Concepts To Learning
Applying Game Concepts To LearningApplying Game Concepts To Learning
Applying Game Concepts To Learning
 
Skp global expansion updates-February 2016
Skp global expansion updates-February 2016Skp global expansion updates-February 2016
Skp global expansion updates-February 2016
 
Grafico diario del dax perfomance index para el 11 06-2012
Grafico diario del dax perfomance index para el 11 06-2012Grafico diario del dax perfomance index para el 11 06-2012
Grafico diario del dax perfomance index para el 11 06-2012
 
Show Musical São Paulo - Dinardi Junior
Show Musical São Paulo - Dinardi Junior Show Musical São Paulo - Dinardi Junior
Show Musical São Paulo - Dinardi Junior
 
Question C IE
Question C IEQuestion C IE
Question C IE
 
Malaria
MalariaMalaria
Malaria
 
バズ・オブ・ビアマジ21
バズ・オブ・ビアマジ21バズ・オブ・ビアマジ21
バズ・オブ・ビアマジ21
 
Catalogue of stone coated roofing sheets from SGB-China
Catalogue of stone coated roofing sheets from SGB-ChinaCatalogue of stone coated roofing sheets from SGB-China
Catalogue of stone coated roofing sheets from SGB-China
 
Grafico diario del dax perfomance index para el 13 07-2012
Grafico diario del dax perfomance index para el 13 07-2012Grafico diario del dax perfomance index para el 13 07-2012
Grafico diario del dax perfomance index para el 13 07-2012
 
03 agency pres sensors - jesper rhode pdf
03 agency pres sensors - jesper rhode pdf03 agency pres sensors - jesper rhode pdf
03 agency pres sensors - jesper rhode pdf
 
The Architecture of Continuous Innovation - OSCON 2015
The Architecture of Continuous Innovation - OSCON 2015The Architecture of Continuous Innovation - OSCON 2015
The Architecture of Continuous Innovation - OSCON 2015
 
Magical Mouse Schoolhouse: Tom Sawyer Island
Magical Mouse Schoolhouse: Tom Sawyer IslandMagical Mouse Schoolhouse: Tom Sawyer Island
Magical Mouse Schoolhouse: Tom Sawyer Island
 
Why use a contractor
Why use a contractorWhy use a contractor
Why use a contractor
 
MHS Alumna Becomes White House Social Secretary
MHS Alumna Becomes White House Social SecretaryMHS Alumna Becomes White House Social Secretary
MHS Alumna Becomes White House Social Secretary
 
NBA All-Time Starting Five
NBA All-Time Starting FiveNBA All-Time Starting Five
NBA All-Time Starting Five
 
Be phenomenal 21 key success factors for leaders & managers
Be phenomenal 21 key success factors for leaders & managersBe phenomenal 21 key success factors for leaders & managers
Be phenomenal 21 key success factors for leaders & managers
 
Creating Documentation With A Wiki: The DITA Storm Project
Creating Documentation With A Wiki: The DITA Storm ProjectCreating Documentation With A Wiki: The DITA Storm Project
Creating Documentation With A Wiki: The DITA Storm Project
 

Similar to Ubiquitous Computing and AmI Smart Environments

The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
carmanl5wisc
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
Purvi Sankhe
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali Jindal
ShifaliJindal
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
Assem mousa
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
Amey Naik
 
AMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri MattaAMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri Matta
bagisrim
 
Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014
Marios Kyriazis
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
Laurie Lamberth
 
ubicom-ch02-slides.ppt
ubicom-ch02-slides.pptubicom-ch02-slides.ppt
ubicom-ch02-slides.ppt
SattiBabu16
 
Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...
Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...
Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...
Psicosociomedia Psicosociomedia
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
jan aljan
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
Atifa Aqueel
 
CI_module1.pptx .
CI_module1.pptx                                   .CI_module1.pptx                                   .
CI_module1.pptx .
Athar739197
 
Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008
Ian Miles
 
The Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the WebThe Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the Web
Andreas Kamilaris
 
Thrive in a New Economy
Thrive in a New EconomyThrive in a New Economy
Thrive in a New Economy
Rupak Parajuli
 
Introducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM UniversityIntroducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM University
Leandro Agro'
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Smart cities: how computers are changing our world for the better
Smart cities: how computers are changing our world for the betterSmart cities: how computers are changing our world for the better
Smart cities: how computers are changing our world for the better
Roberto Siagri
 

Similar to Ubiquitous Computing and AmI Smart Environments (20)

The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali Jindal
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Iot amey p naik
Iot amey p naikIot amey p naik
Iot amey p naik
 
AMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri MattaAMBIENT INTELLIGENCE by Bhagyasri Matta
AMBIENT INTELLIGENCE by Bhagyasri Matta
 
Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014Internet of things and nanothings workshop may 2014
Internet of things and nanothings workshop may 2014
 
The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.The Internet of Things. How it Works. Why it Matters.
The Internet of Things. How it Works. Why it Matters.
 
ubicom-ch02-slides.ppt
ubicom-ch02-slides.pptubicom-ch02-slides.ppt
ubicom-ch02-slides.ppt
 
Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...
Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...
Social Video & Visual Strategy - Lezione 4 Ubiquitous Computing & Augmented R...
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
CI_module1.pptx .
CI_module1.pptx                                   .CI_module1.pptx                                   .
CI_module1.pptx .
 
Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008
 
The Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the WebThe Web of Things: Enabling the Physical World to the Web
The Web of Things: Enabling the Physical World to the Web
 
Thrive in a New Economy
Thrive in a New EconomyThrive in a New Economy
Thrive in a New Economy
 
Introducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM UniversityIntroducing the Internet of Things: lecture @IULM University
Introducing the Internet of Things: lecture @IULM University
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Smart cities: how computers are changing our world for the better
Smart cities: how computers are changing our world for the betterSmart cities: how computers are changing our world for the better
Smart cities: how computers are changing our world for the better
 

More from JosephHowerton

UX Research and Design Portfolio
UX Research and Design Portfolio UX Research and Design Portfolio
UX Research and Design Portfolio
JosephHowerton
 
The Constructs of Cognitive Science
The Constructs of Cognitive ScienceThe Constructs of Cognitive Science
The Constructs of Cognitive Science
JosephHowerton
 
Traumatic Brain Injury (paper outline with annotated bibliography)
Traumatic Brain Injury (paper outline with annotated bibliography)Traumatic Brain Injury (paper outline with annotated bibliography)
Traumatic Brain Injury (paper outline with annotated bibliography)
JosephHowerton
 
The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...
The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...
The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...
JosephHowerton
 
Neighborhood Watch mobile app (usability testing documentation)
Neighborhood Watch mobile app (usability testing documentation)Neighborhood Watch mobile app (usability testing documentation)
Neighborhood Watch mobile app (usability testing documentation)
JosephHowerton
 
Park and Seek Mobile app (usability testing documentation)
Park and Seek Mobile app (usability testing documentation)Park and Seek Mobile app (usability testing documentation)
Park and Seek Mobile app (usability testing documentation)
JosephHowerton
 
The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...
The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...
The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...
JosephHowerton
 
Freecycle.org usability findings and recommendations
Freecycle.org usability findings and recommendationsFreecycle.org usability findings and recommendations
Freecycle.org usability findings and recommendations
JosephHowerton
 
Park and Seek mobile app prototype
Park and Seek mobile app prototypePark and Seek mobile app prototype
Park and Seek mobile app prototype
JosephHowerton
 
Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)
JosephHowerton
 
UX for Good 2012 (NOLA)
UX for Good 2012 (NOLA)UX for Good 2012 (NOLA)
UX for Good 2012 (NOLA)
JosephHowerton
 

More from JosephHowerton (11)

UX Research and Design Portfolio
UX Research and Design Portfolio UX Research and Design Portfolio
UX Research and Design Portfolio
 
The Constructs of Cognitive Science
The Constructs of Cognitive ScienceThe Constructs of Cognitive Science
The Constructs of Cognitive Science
 
Traumatic Brain Injury (paper outline with annotated bibliography)
Traumatic Brain Injury (paper outline with annotated bibliography)Traumatic Brain Injury (paper outline with annotated bibliography)
Traumatic Brain Injury (paper outline with annotated bibliography)
 
The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...
The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...
The role of cognitive aids in Traumatic Brain Injury rehabilitation: a single...
 
Neighborhood Watch mobile app (usability testing documentation)
Neighborhood Watch mobile app (usability testing documentation)Neighborhood Watch mobile app (usability testing documentation)
Neighborhood Watch mobile app (usability testing documentation)
 
Park and Seek Mobile app (usability testing documentation)
Park and Seek Mobile app (usability testing documentation)Park and Seek Mobile app (usability testing documentation)
Park and Seek Mobile app (usability testing documentation)
 
The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...
The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...
The Freecycle Network (Expert Evaluation: Heuristic Evaluations and Cognitive...
 
Freecycle.org usability findings and recommendations
Freecycle.org usability findings and recommendationsFreecycle.org usability findings and recommendations
Freecycle.org usability findings and recommendations
 
Park and Seek mobile app prototype
Park and Seek mobile app prototypePark and Seek mobile app prototype
Park and Seek mobile app prototype
 
Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)Neighborhood Watch prototype (storyboard narrative)
Neighborhood Watch prototype (storyboard narrative)
 
UX for Good 2012 (NOLA)
UX for Good 2012 (NOLA)UX for Good 2012 (NOLA)
UX for Good 2012 (NOLA)
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 

Ubiquitous Computing and AmI Smart Environments

  • 1. Ubiquitous Computing and AmI Smart Environments (From Human Computer Interaction to Human Environment Interaction) Joseph Howerton HCI 594 - Professor Adam Steele DePaul University 11/29/2011
  • 2. The Evolving Information Society • Major advancements in the Internet and smart devices over the last two decades. • Societies appear ready to adopt new technology hardware and application advances just as fast as they emerge. • The result is profound advancements in the way humans communicate and interact.
  • 3. Three major waves in computing • First Wave was many people per computer. • Second Wave was one person per computer. • Third Wave will be many computers per person. Also called The Now Economy.
  • 4. Three major waves in computing
  • 5. The concept of Moore’s Law • Says that the number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years (or 18 months). • Result. Computing devices continue to become more and more miniaturized, while increasing in computing power and wireless connectivity.
  • 6. Ubiquitous Computing (UbiComp) • Mark Weiser, The Father of UbiComp, coined the term “ubiquitous computing” in his seminal article,The Computer For The 21st Century, Scientific American, September 1991. • Weiser asserts that, “the most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.
  • 7. What is UbiComp? • Ubiquitous Computing pre-supposes the idea that: • “machines should fit into the human environment, instead of forcing humans to enter into the machine’s environment.”
  • 8. What is UbiComp? • Embedded: many networked devices are integrated into the everyday objects in any given environment. • Context aware: these devices can recognize you and your situational context. • Personalized: they can be tailored to your needs. • Adaptive: they can change in response to you. • Anticipatory: they can anticipate your desires without conscious mediation.
  • 9. Weiser’s Vision • “We are therefore trying to conceive a new way of thinking about computers, one that takes into account the human world and allows the computers to vanish into the background.” Mark Weiser
  • 10. Ambient Intelligence (AmI) (A new computing paradigm) • A result of the increasing demand for ubiquitous and continuous access to information and services. • AmI refers to “electronic environments that are sensitive and responsive to the presence of people.”
  • 11. The Roots of AmI • “AmI refers to a multi-disciplinary area of research and development which embraces a variety of pre-existing fields of computer science as well as engineering.” • AmI brings together all of these resources to provide flexible, intelligent services to users acting in their environments.
  • 12. The Roots of AmI • AmI was first proposed by the consumer electronics company Philips in the late 1990s “as a novel paradigm for consumer electronics that are sensitive to, and responsive to, the presence of people.” • Philips’ HomeLab initiative, which was an advanced lab designed to conduct usability and feasibility studies in AmI that officially opened in 2002.
  • 13. The Roots of AmI • This was accomplished first in the home lighting market, where lighting “systems” would turn on with the presence of people, or outdoor lights that turn on when the environment turns dark.
  • 14. The Roots of AmI • The EU’s Information Society Technologies Program Advisory Group (ISTAG) “used the term Ambient Intelligence (AmI) to describe a vision where people will be surrounded by intelligent and intuitive interfaces embedded in everyday objects and environments.”
  • 16. The AmI Paradigm Shift “The AmI paradigm differs in two major ways from the previous two waves of computing.” • “The user interface has become reactive, that is actions are not explicitly requested but are the result of the mere presence of people or their avatars.” • “The meaning of computation can no longer be associated to a single device or a set of connected devices, but is located in the collection of devices.”
  • 17. The foundations of AmI “Smart environments” • Integration of sensing capabilities • Processing power • Reasoning mechanisms • Networking facilities • Applications and services • Digital content • Actuating capabilities (to be distributed in the surrounding environment)
  • 18. AmI Smart Objects • Environment characterized by invisible, embedded computational power in everyday devices and appliances. • Augmenting the physical properties and affordances of artefacts with the potential of computer-based support, i.e. creating “Smart Objects.”
  • 19. The Constructs of AmI Smart Environments
  • 20. Social Challenges and Implications • A world filled with AmI all knowing, all reporting objects. • Comprehensive monitoring and surveillance. • Total market transparency. • How much privacy are we willing to trade to achieve increased productivity.
  • 21. Social Challenges and Implications • A world filled with AmI all knowing, all reporting objects. • Comprehensive monitoring and surveillance. • Total market transparency. • How much privacy are we willing to trade to achieve increased productivity.
  • 22. Social Challenges and Implications • A world filled with AmI all knowing, all reporting objects. • Comprehensive monitoring and surveillance. • Total market transparency. • How much privacy are we willing to trade to achieve increased productivity.
  • 23. Privacy • “Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” Alan Westin
  • 24. Acceptance and Adoption • Acceptance and adoption of AmI Smart Environments will be founded in trust and privacy. • This will remain a paramount action item for proponents of emerging AmI landscapes.
  • 25. Conclusion This question is addressed to UI and UX designers, as well as current and budding HCI professionals. • Will we address the impending pitfalls to AmI early in the design phase in order to shape the envisaged systems according to fundamental social and ethical requirements?