IT@ White Paper Intel IT Context-Aware Computing July 2013

Creating Business Value through Context-Aware Computing

Executive Overview Context-aware computing Intel IT is discovering that context-aware computing offers substantial business provides task-relevant value across the enterprise. Context-aware computing factors in the situation of an information or services, making entity—whether a person, place, or thing—and provides task-relevant information tasks more efficient and or services, making tasks more efficient and improving decision making through context-driven recommendations. improving decision making through context-driven Examples of broad enterprise use cases that We are just beginning to use context recommendations. offer business value include the following: awareness at Intel. We are developing a central context-aware computing service • Employee and team productivity. because many use cases have certain Context can improve team effectiveness aspects in common. This centralized context and the use of office resources while as a service transforms available sensor data personalizing computing interfaces. into information that can be used and reused • Enforcement of IT consumerization, in multiple use cases to create business value. security, and privacy controls. Context A centralized context-awareness service also can be used to enable a flexible and helps future-proof our investment in context- dynamic security model that can adapt aware computing against inevitable changes to a user’s work or personal situation, in sensors and data types. enforcing the appropriate controls to We are working to realize the business value protect corporate intellectual property of enterprise-level context computing and and assets, and to protect a user’s have already conducted several successful personal information. proofs of concept. We plan to continue to • Business continuity. Sensors can monitor evaluate sensors, share learnings with Intel factory equipment to help predict equipment product groups to improve sensor accuracy, failures and enable proactive maintenance. and manage privacy risks. Paul Donohue Handheld Engineer, Intel IT • Facilities management. Sensors can help reduce energy costs by providing better James Harris Audio/Video Engineer, Intel IT energy management and can help reduce the need for preventive maintenance Jon McDermott through automation. Enterprise Architect, Intel IT

Dave Stone Prototype Engineer, Business Client Platform Division IT@Intel White Paper Creating Business Value through Context-Aware Computing

Contents Establishing information could include directions to vacant parking spaces closest to the Executive Overview...... 1 Context‑Aware meeting location. Computing Use Cases Establishing Context‑Aware –– Personalize computing interfaces; for Computing Use Cases for the for the Enterprise example, an application might know Enterprise...... 2 In the consumer market, context- what resources are nearby, such as aware applications are fairly common. printers, scanners, and networks, and Exploring Context‑Aware automatically connect to them without Computing at Intel...... 3 However, in the enterprise, context- aware applications are currently any effort on the employee’s part. Sensor Evaluation...... 4 rare because of their technical –– Increase processing power by taking Delivery of Context as a Service..... 5 challenges, security risks, and privacy advantage of unused CPU cycles on Proofs of Concept...... 6 concerns. That reality is changing. distributed across Intel’s Key Learnings...... 8 As connectivity, mobility, and sensor private enterprise cloud. technologies continue to evolve, What’s Next for Context-Aware • Enforcement of IT consumerization, they create new opportunity in the Computing at Intel...... 9 security, and privacy controls enterprise. We can now digitally gather –– Enable IT consumerization by supporting the context in the form of information Conclusion...... 10 a flexible and dynamic compute model that can be used to characterize the that adapts to a user’s work or personal For More Information...... 10 situation of an entity—whether a situation. person, place, or thing—and use that Acronyms...... 10 –– Support a dynamic security model to information to provide business value. protect corporate intellectual property We are developing context-aware computing and assets. because we believe it has the potential to –– Protect corporate physical assets, such provide significant benefits that can empower as or printers, by using sensors end users and the enterprise as a whole. and geofencing.1 For example, context-aware computing can –– Manage access to an employee’s personal provide task-relevant information or services, information based on his or her consent; automate or make tasks more efficient, and for example, an employee may choose improve decision making through context- to share his or her specific geolocation driven recommendations. We foresee diverse information with other co-workers. uses for context data in the enterprise that include the following: • Business continuity –– Monitor equipment, such as factory • Employee and team productivity water pumps and fans, to help predict –– Improve team collaboration and equipment failures. project velocity by providing a way for IT@Intel employees to share information—if they –– Combine equipment monitoring data The IT@Intel program connects IT choose to—about their current context, with key operating parameters to professionals around the world with their such as whether they are in or out of create dashboards and alerts for peers inside our organization – sharing the office. equipment health. lessons learned, methods and strategies. –– Improve the use of office resources –– Enable proactive maintenance that Our goal is simple: Share Intel IT best such as conference rooms, printers, would reduce downtime and potential practices that create business value and damage, as well as reduce overall make IT a competitive advantage. Visit and available desks or parking spaces. maintenance costs by enabling an “as us today at www.intel.com/IT or contact –– Provide personalized just-in-time needed” rather than a “just in case” your local Intel representative if you’d information, such as the time and location preventative maintenance model. like to learn more. of an employee’s next meeting. If the

meeting is at a different campus, the 1 Geofencing is the process of establishing location-based borders using positioning technology.

2 www.intel.com/IT Creating Business Value through Context-Aware Computing IT@Intel White Paper

• Facilities management Intel IT, in partnership with Intel business Quantifying the Opportunity for –– Reduce energy costs by providing groups, is investigating context-aware Context-Aware Computing better energy management. computing in the enterprise through three No Centralization activities. + Solutions developed –– Improve data center load balancing by one use case at a time optimizing workload based on • Sensor evaluation. Many types of power, temperature, and workload priority. environment sensors currently exist, and –– Automate equipment monitoring so more are entering the market. The goal of BUSINESS VALUE OPPORTUNITY facility technicians do not have to our evaluations is to identify the types and We Are Here perform preventive checks; they can work combinations of sensors that provide the best information and, therefore, the most on projects with higher business value. and Complexity Cost business value. Centralized Context-as-a-Service Approach –– Provide space-usage data that can help • Less expensive and less time-consuming • Easier to adapt to new technology planners optimize new or existing office • Delivery of context as a service. As we • Easier to implement security and privacy policies areas based on actual usage. This data develop a central solution, we focus on – – Context-Enabled Applications + could help match workspace supply four areas. and Sensors –– Abstraction that hides the underlying with demand and forecast future needs. Figure 1. Having identified diverse enterprise complexity from users and application use cases for context-aware computing, Intel developers IT believes it is more efficient to establish –– Aggregation to combine context data a centralized approach instead of creating a unique solution for each use case. Exploring from multiple sources Context‑Aware –– Interpretation of sensor data to transform Computing at Intel raw data into meaningful context The development of context-aware –– Policy management to enforce privacy, computing is part of Intel IT’s larger security, and legal controls effort to enable enterprise applications • Proofs of concept (PoCs). Projects can to support the devices of today, such demonstrate enterprise relevance and as touch-enabled business Ultrabook™ business value while generating ideas devices and tablets, and also develop for more use cases. applications that are ready for emerging Increasingly, Intel and OEMs are adding interaction methods, such as voice, sensors to platforms. We are deploying to gesture, and perceptual computing. Intel employees the newest generation of business Ultrabook devices, which are As Figure 1 illustrates, we are just beginning to equipped with various sensors such as indoor make use of context data at Intel. The Internet location sensors. We will soon be deploying of Things—new sensors, new entities, and Intel® architecture-based and new ways of creating, gathering, and using tablets that also include sensors. In addition information without requiring data entry by to the high-value platform-based sensors, we humans—is constantly expanding, making more also believe that discrete sensors—sensors and more context data available. By developing that are independent of a compute platform, a centralized approach to context-aware such as room-occupancy sensors—can add computing, we can future-proof our context value to the computing experience. Our investment against inevitable changes in context-awareness service presents an sensors and data types. At the same time, we opportunity to use client and environment can implement governance and accountability sensors to deliver substantial value across processes and enforce privacy and security the enterprise. controls that can adapt to new technologies and use cases.

www.intel.com/IT 3 IT@Intel White Paper Creating Business Value through Context-Aware Computing

Sensor Evaluation Integrating an Ecosystem of • Sensor connectivity. To provide data to Sensors with the Business cloud-based applications, sensors must Sensors can provide context for the following be connected to a network. Similar to types of entities: We already have both hard and soft sensors deployed at Intel. For example, our employee power choices, connectivity choices have • Person. Examples include employee, badge reader is a hard sensor, and user advantages and disadvantages. Wireless customer, supplier, and visitor. presence in our instant messaging system connectivity can be quick and inexpensive • Place. Examples include conference room, is a soft sensor. As shown in Figure 2, our to install but may introduce security and café, restroom, and parking lot space. experience has shown that business value wireless channel interference challenges. • Thing. Examples include client device, increases exponentially when combining There are also trade-offs between standard server device, factory water pump, printer, sensors of any kind, and combined sensors IP-based LAN/WAN connections compared vending machine, and lab equipment. provide more useful information than single to a low-power mesh network that is either standards-based or proprietary. In addition to categorizing sensors as either sensors alone. In many cases, this value can client or environment, sensors can be be achieved by business applications without • Sensor trust. As the mission criticality of either hard or soft. installing new sensors. For example, application context-enabled enterprise applications developers can simply use data from existing increases, so will the importance of establishing • Hard sensors are either discrete or hard and soft sensors, such as collaboration a trust model for sensors that provide integrated. Examples of discrete hard and messaging tools and the badge reader. context data. A standards-based mechanism sensors include motion sensors, badge for validating the identity and authenticity readers, radio-frequency identification To achieve an integrated ecosystem of Increasing Value by of sensors and preventing sensor-injected scanners, location sensors, and climate sensors, we must surmount some technical Combining Sensor Inputs malware will become increasingly important. sensors, such as temperature, humidity, and challenges associated with sensors installed One Sensor Few Sensors Many Sensors • Data collection methods and protocol. atmospheric pressure. Business Ultrabook in the enterprise environment. For example: What is my current activity? Ideally, all sensors would use the same devices, tablets, and smartphones are often • Sensor power. Decisions about powering standardized communications protocol equipped with integratedWhere is the hard nearest sensors, parking space? sensors (particularly discrete hard sensors) and would support both query/response such as location awareness, accelerometers, impact both initial installation costs (synchronous) and publish/subscribe compasses, and gyroscopes.What are my meeting logistics? and long-term sensor support costs. (asynchronous) data collection methods. • Soft sensors use applications to create Hard-wired AC or DC power can increase Where am I? (Fine-grained location) However, at this exploratory stage, we context. Examples include appointment initial installation costs but can reduce are evaluating and testing hard and soft and– shift calendars,Business conference Value room + sustaining costs and improve reliability. (in dollars) sensors that use various sensor protocols booking tools, user preferences, and Battery power reduces installation costs and data collection methods. Unifying applications that provide load balancing but requires recurring battery replacement these differences and masking complexity for network activity. costs (primarily labor) over the long term is one of the key capabilities of the and can reduce sensor reliability.

Exponential Value by Combining Sensor Inputs

Many Sensor Inputs Where am I and what are my meeting logistics, and where is the nearest parking space and what am I doing, and so on?

Few Sensor Inputs Where am I and what are my meeting logistics, and where is the nearest parking space?

Single Sensor Input Where am I? or What are my meeting logistics?

– Business Value (in dollars) +

Figure 2. The layers of information produced by a combination of sensors provide the best business value.

4 www.intel.com/IT Creating Business Value through Context-Aware Computing IT@Intel White Paper

context-awareness service we are building • Flexibility and agility. Sensor technology Implementing Context (see “Delivery of Context as a Service”). is changing rapidly, and some of these Awareness That Enables • Privacy governance and accountability. changes are unpredictable. Intel IT needs Personal Privacy Intel collects personal information for an approach to using sensors that allows Security and privacy are critical concerns specific purposes, and employees are us to use the best available sensors today, when considering context-aware notified of that purpose when they provide with the flexibility to deploy new sensors computing. We are applying Intel’s information. Processing information for as they become available. If adoption of privacy principles early in the design a different purpose or to aggregate it new sensor technology requires reworking cycle to ensure that context as a service with other data may require additional or rewriting existing context-enabled is designed to enable privacy from notification and consent. As we develop business applications, context adoption the beginning. We are educating the context-aware solutions, we must be able will be severely limited. development team on privacy principles to determine which sensor data represents • Ability to integrate sensor data. While prior to design so that all parties personal information, how an employee has simple context-enabled capabilities can be understand, respect, and follow Intel’s consented to have that information used, delivered using a single sensor, the value of privacy policies. Developers need to know and at what point sensor data transitions the capability is often greater when data what data is considered personal so it from being general and anonymous to from multiple sensors can be combined. can be handled appropriately throughout personal and identifiable. This approach will involve combining data its lifecycle. They must also clearly from integrated and discrete sensors and We are discovering the business advantage communicate with application users about applying business rules to the raw data to of creating applications that connect with a what data is being collected and why, and transform it into useful context data. variety of hard and soft sensors. An ecosystem provide users with control over how their of sensors throughout the enterprise will • Privacy. The ability to provide context data will be used. enable use of these sensors and support awareness to applications raises concerns the ability to customize the ever-expanding about security and privacy. We are using As more sensors begin to be used Internet of Things for specific business usages. Intel’s established privacy principles to and more applications begin to use ensure that our context as a service is context data, developers must factor Enterprise Requirements designed with privacy in mind. It is important privacy considerations into the design. For example, in our room occupancy In addition to costs, such as those related to to define and implement policies to manage use case we selected sensors that did acquisition, installation, and maintenance, we and protect personal information throughout not collect personal information. The use the following criteria when evaluating its entire lifecycle. As we move forward with selected sensors only measure sound sensors for use at Intel: context-aware computing at Intel, we will continue to evaluate the privacy implications levels to help determine occupancy; they • Accuracy. Many enterprise use cases of new sensors and use cases to ensure do not record sounds and are unable demand a level of sensor data accuracy that appropriate privacy controls are in place. to determine how many people may that is much higher than similar consumer be in a room. The context-awareness use cases. One example is location sensing Delivery of service shares only whether the room is for improved collaboration and meeting Context as a Service occupied. In use cases where personal effectiveness. Determining whether an data is necessary, the appropriate There is value in sharing, reusing, and employee is inside a specific room or controls must be in place to provide aggregating context data across multiple within a nearby corridor requires a level of information only to applications where use cases. Therefore, we believe it is more location precision that is not necessary for the employee has given prior consent. efficient, in terms of both development time outdoor navigation systems based on the and expenditure, to establish a central context- Our goal is to centralize security and Global Positioning System (GPS). Likewise, aware computing service instead of creating privacy controls so developers can focus when the enterprise uses context data a unique solution for each use case. Intel IT is on delivering unique business value to dynamically adjust the level of security developing a centralized context-awareness through their applications’ functionality, protection applied to a user’s computing service that transforms sensor data into user interface, and business logic. environment, the system must be able information that can be used and reused to to trust that the sensors are providing deliver business value. As part of our efforts, accurate data that is not subject to we are designing a solution with privacy impersonation or spoofing. controls in place throughout the data lifecycle

www.intel.com/IT 5 IT@Intel White Paper Creating Business Value through Context-Aware Computing

(see the sidebar “Implementing Context not need to change frequently. This stable Policy Enforcement Awareness That Enables Personal Privacy”). interface of context data can accommodate The context-awareness service provides adding new or modified sensors as they Context as a service provides an abstracted set foundational security and privacy controls become available, but business applications of data services—sensor abstraction, sensor that enable users to regulate how their won’t need to be changed or rewritten each aggregation, data interpretation, and policy context data can be used in applications and time a sensor changes. enforcement—that insulates applications from under what circumstances. The service also rapid technology change and provides context provides employees with the ability to revoke Sensor Aggregation data as a shareable and reusable resource. For access when necessary. In some cases it example, Intel IT’s Wayfinder2 application helps Often, more than one sensor is needed would be against policy to allow access to employees navigate from their current location to answer a context question accurately. raw sensor data; however, access could be to a desired point of interest, such as a printer, For example, a single motion sensor could allowed for an interpretation of that data. determine conference room occupancy. cafeteria, or conference room. This application Beyond these fundamental controls, business However, obtaining accurate results requires uses the same context sources as the applications typically need to provide sufficient movement in the room to indicate Conference Room Occupancy PoC (described additional business-specific security and occupancy. Context as a service can combine in detail in “Proofs of Concept”). Context as a privacy controls that are required for the sensor data from multiple sensors, such as service enables both of these applications, business problem being solved. For more motion, light levels, and sound levels, thereby as well as applications developed information on how Intel IT implements providing a much more complete and accurate subsequently, to access the context data privacy controls for context as a service, set of data. they need without having to re-create refer to the sidebar “Implementing Context infrastructure and business logic. Awareness That Enables Personal Privacy”. Data Interpretation As shown in Figure 3, the context-awareness Raw sensor data is often not useful to service acts as middleware between the Proofs of Concept business applications, because it needs to raw data from the sensors and the business We conducted several PoCs and technology be interpreted after it is aggregated. Context applications that consume that data. The evaluations related to context-aware as a service provides basic interpretation context-awareness service includes business computing in the enterprise. These PoCs help of sensor data, especially in cases where logic that abstracts, aggregates, and interprets us understand the capabilities of a broad range a common interpretation of sensor data is the data. The business logic also enforces of discrete and integrated sensors, identify highly desirable. For example, the service could corporate security and privacy controls. enterprise usages, and understand privacy transform aggregated raw data from a motion implications so we can design appropriate sensor, a light-level sensor, and a sound-level Sensor Abstraction privacy controls. They also demonstrate the sensor into “Occupied” or “Vacant.” Providing While sensor technology is likely to change business value of context-aware computing this functionality in the context-awareness rapidly and often, the middleware tier helps and have inspired us to learn more about what service does not preclude business-specific provide application developers and end can be accomplished using context. This section interpretation where needed; business users with a consistent interface that does provides details about three of these PoCs: applications can receive the raw sensor data conference room occupancy, the Wayfinder 2 See “Getting a Headstart on Location-based Services in for custom interpretation in most cases. the Enterprise,” January 2013. application, and intelligent camera disablement.

Sensors Context-Awareness Service Business Applications Context Data Sources Business Logic Consumers of Context Data

Figure 3. Our three-tier model enables business applications to access context data without re-creating infrastructure and business logic.

6 www.intel.com/IT Creating Business Value through Context-Aware Computing IT@Intel White Paper

Conference Room Occupancy provided motion, light, and sound levels; this Transforming the IT Ecosystem Conference rooms are in high demand at Intel. data was combined by the context-awareness to Support the Applications While we have an online system for booking service to determine room occupancy. By and Devices of the Future conference rooms, we were unable to tell from using a sensor that collected only sound We have identified five criteria that lead looking at the schedule whether a room was levels instead of performing complex voice to a better end-user experience: security, physically occupied. We developed a solution processing analysis, the sensors helped protect ease of use, platform independence, that displays room status on a digital sign (see users’ privacy. The sensors are not capable of device independence, and support for Figure 4), using both room schedule information determining how many people are in a room emerging devices and interactions. These from Intel’s Conference Room Scheduling tool and mitigate potential concerns about remote same criteria create a better application and room occupancy information from sensors eavesdropping or audio recording. developer experience by removing installed in the rooms. The sensor data is Benefits Realized obstacles and providing readily available consumed, interpreted, and published using In addition to the benefit of helping tools to increase application developer context as a service. ¢ employees determine room availability, the productivity and efficiency. PoC Description PoC demonstrated an even more important Our context-awareness service can create For this PoC the occupancy information was business value: It gives us the ability to use reusable components that make context- displayed at three interactive digital signage context data to measure the actual use of a aware application development easier. In locations. Context as a service also allowed us meeting space in order to match supply with addition to creating applications that work to easily make it available to other applications, demand and to forecast future needs. We can better now and can take advantage of such as an indoor navigation application on apply what we learned about space usage future technology changes, our work affects smartphones or a business Ultrabook device. when we build or remodel Intel campuses. almost every infrastructure component, The 90-day PoC involved two floors in one Also, we can extend this PoC to other including management, mobile building, covering approximately 90 conference use cases, such as energy management. application lifecycle management, and rooms, collaboration rooms, and internal Overall, we received positive feedback from application testing and scalability. participants in the PoC as well as strong phone booths. ¢ For more information about our new initiative that interest from Intel business groups and focuses on accelerating delivery of applications to The digital signage indicated whether a our business partners and employees on their mobile external companies. platform(s) of choice, see “Accelerating our Path to conference room was occupied. The sensors Multi-Platform Benefits,” May 2013.

Figure 4. During the Conference Room Occupancy proof of concept, room status was displayed on a digital sign.

www.intel.com/IT 7 IT@Intel White Paper Creating Business Value through Context-Aware Computing

Wayfinder Application Pinpoint PoC that used key learnings from Benefits Realized Intel IT recognizes the great opportunity for both the Conference Room Occupancy and This PoC will demonstrate the value of being using location-based services in the enterprise, Wayfinder application PoCs. The Pinpoint PoC able to dynamically control device functionality and we are already piloting several location- demonstrated the value of adding location in a restricted area where business needs based applications that consume these services. information to other context data. In this require a certain policy but will allow full use of Employees can choose to use location-based PoC, employees connected their business device features when employees are outside services to help derive value from their own Ultrabook devices to the wireless network to that area. location and the relative location of other identify their location on campus, and then resources in the work environment. merged that information with information Key Learnings about a conference room’s availability and Based on our PoCs and technology occupancy information. This process provided PoC Description evaluations, we believe that an ecosystem of turn-by-turn directions inside the building to In late 2011, we began a technology sensors and context as a service can provide an available, unoccupied conference room. evaluation and PoC of a significant business value. The following list application that provides indoor campus maps summarizes what we have learned. and navigation that enables employees to Intelligent Camera Disablement • Now is the time. New sensor locate the nearest conference room, printer, Intel employees’ use of smartphones technologies, combined with ubiquitous defibrillator, or exit at a particular campus. The increases employee productivity and enterprise connectivity and powerful application uses indoor Wi-Fi* trilateration3 mobility throughout the enterprise. In mobile devices, make now the logical to show an employee’s current location on particular, corporate and personally owned time to develop context as a service even the campus map and delivers indoor turn- smartphones enable employees to access though some components, such as certain by-turn navigation. The PoC was designed corporate data—such as email, contacts, types of sensors and middleware, are not to have minimal device and configuration and calendar—and other select enterprise yet mature. For example, the accuracy requirements. We are now beginning broader applications, anytime, anywhere. However, of certain sensors is not sufficient for deployment of the Wayfinder application. because smartphone cameras pose a widespread enterprise use. Also, the indoor significant risk to Intel’s intellectual property, location accuracy of commercially available Benefits Realized such as sensitive manufacturing process solutions presents a challenge. We can Using location-based services, such as the data, we currently do not permit employees consistently achieve accuracy within about Wayfinder application, in the enterprise offers to use smartphones or personally owned cell 10 meters, although sometimes accuracy the following benefits: phones in Intel’s factories. We want to allow improves to 5 to 8 meters. corporate-owned smartphones in our factory • Employees can more efficiently connect environment to enable new advanced • Context as a service improves the to the resources around them and find the mobility capabilities and productivity gains. benefits of a bring-your-own-device right resources at the time they need them. program. In 2008 we determined that • Employees enjoy a more seamless and PoC Description supporting the consumerization of IT continuous experience across platforms, We are planning to conduct a PoC that uses would improve enterprise security by devices, and operating systems, whether context to intelligently disable smartphone eliminating unsecured and unmanaged outdoors or indoors. cameras. Based on context, such as shift use of personal devices in the enterprise. • Our efforts support Intel’s strategic calendar, location of device, and user role, We chose to integrate employee-owned objective to develop location-based we will dynamically apply the camera-disable devices—including smartphones, tablets, services for mobile platforms, as part of policy. For example, while the employee is in and PCs—into our enterprise environment. the overall compute continuum vision. the clean room the camera does not function, When complete, our context-as-a-service Based on the success of the Wayfinder but it does when the employee is outside of infrastructure will enable us to deliver rich application PoC, we conducted a subsequent restricted areas. enterprise user experiences on devices that employees already have as well as ready-made consumer-oriented applications 3 Trilateration is the process of determining absolute or relative locations of points by measurement of distances, that can be tuned for business purposes. using the geometry of circles, spheres, or triangles.

8 www.intel.com/IT Creating Business Value through Context-Aware Computing IT@Intel White Paper

To achieve these goals, we must look for We are considering the following activities: • Develop supporting data. Sensors are opportunities in the consumer application only one part of gathering and providing • Develop new PoCs and projects market and apply the appropriate level of context. Supporting data includes campus –– Expand the conference room security and management to all devices. maps, parking lot maps, map metadata, occupancy PoC. Test additional sensor • IT needs better access to back-end and the latitude and longitude of campus types and explore adding the Conference services. The use of context-enabled resources. Room Scheduler application as a enterprise applications often involves a • Take advantage of sensors external to consumer of occupancy information. combination of context data from a variety Intel. As context awareness matures, and Using this information, the scheduler of hard and soft sensors as well as data as consumerization becomes the norm, application could release reservations for from enterprise back-office systems. Further, sensors used outside of Intel will provide rooms that remain unused for a certain these applications are relevant and valuable useful information. We anticipate that period of time. We also intend to build when deployed on a diverse set of client combining data from our own sensors with a multi-platform web-based application platforms ranging from managed business data from a greater number of sensors that will deliver information about Ultrabook devices to employees’ personal that already exist in the larger Internet of conference room occupancy, similar to mobile devices. Therefore, it is important that Things can increase the effectiveness of the digital signs used in the Conference we deliver future systems that are open and enterprise context-aware computing. For Room Occupancy PoC, along with a easily integrated, making no assumptions example, today the Intel Virtual Assistant smartphone application to consume about any device: how it is managed, its uses the GPS to help employees locate this information. connectivity, or the required authentication and obtain driving directions to other Intel method. Open, interoperable systems will –– Parking space occupancy project. campuses. Other sensors external to Intel help accelerate the delivery of context value. Develop a PoC that can provide employees may have potential value, as well. with contextual information about parking • Intelligent investment decisions boost • Explore the possibilities. We see a spaces, such as directing employees to the business value. We have learned that wide range of possibilities in the future, closest available parking space. although initial cost (financial expenditure such as wearable computing combined as well as time and effort) may increase, –– Factory equipment monitoring with context-aware sensors. Location investing in a critical mass of sensors that project. Develop a PoC to monitor measurements, the proximity of other can be used to support a variety of business factory equipment to anticipate devices and places, temperature, humidity, usages provides better business value than failures and optimize preventative sound levels, and energy could all be investing in just a few sensors that support maintenance schedules. combined with data visualization and data only a single use case. The more sensors • Influence and support the Virtual mining techniques. Doing this would help we have available to business applications, Assistant project roadmap. This initiative us better understand how space is used the more context data these applications supports context enablement, using or how a facility performs and operates, or can use to inform, recommend, and support this application platform as a showcase determine the busiest times in a building employees and business groups. and test bed for the next generation of or whether resources are being used context-aware capabilities.4 frequently or optimally. We could also explore advanced data anonymization • Re-educate application developers. techniques and additional privacy controls Encourage application developers to develop What’s Next for that can limit the ability to identify a applications that can consume context data Context-Aware specific individual when processing his as a shareable and reusable resource and or her data in other use cases. Computing at Intel train them to apply privacy principles when With the rapid expansion and designing context-aware applications. advancement of context-aware technologies, we plan to continue 4 Virtual Assistant, formerly referred to as “Business to evaluate sensors and share Assistant,” enables employees to obtain assistance with directions, resource location, information relevant to their learnings with Intel product groups context and preferences, and services when they need to improve sensor accuracy and them, just in time and on-the-go. For more information, refer to “Enabling Emerging Enterprise Usages with mitigate privacy risks. Client-aware Technologies,” February 2012.

www.intel.com/IT 9 Conclusion We have already conducted several context- Acronyms aware PoCs and are in the process of The combination of new sensor GPS Global Positioning System launching several more. These PoCs help technology, increasing connectivity, and PoC proof of concept us understand the capabilities of a variety powerful mobile devices has created of sensors, identify further enterprise significant opportunity to make use of usages, and continue to develop ways to context-aware computing across the protect an employee’s privacy. These PoCs enterprise. We have identified a diverse also demonstrate the business value of set of enterprise use cases for context- context-aware computing and help create aware computing that can support more possibilities for using context data as a business goals, such as increasing business asset in an enterprise setting. team effectiveness and resource usage, improving business continuity and facility and asset management, and providing for dynamic and flexible For More Information support for consumerization and Visit www.intel.com/it to find white emerging device capabilities. papers on related topics:

We believe that it is more efficient in terms • “Digital Personal Assistant for the of both development time and expenditure to Enterprise” establish a centralized context-aware service instead of creating a unique solution for each • “Getting a Headstart on Location-based use case. This centralized approach focuses Services in the Enterprise” on enabling capabilities rather than developing • “Enabling Emerging Enterprise Usages specific solutions, insulates applications from with Client-aware Technologies” rapid technology change, and provides context data as a shareable and reusable resource managed with privacy controls.

For more information on Intel IT best practices, visit www.intel.com/it.

Ultrabook™ device products are offered in multiple models. Some models may not be available in your market. Consult your Ultrabook device manufacturer. For more information and details, visit www.intel.com/ultrabook. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel, the Intel logo, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2013 Intel Corporation. All rights reserved. Printed in USA Please Recycle 0713/JGLU/KC/PDF 328925-001US