History HCI Application: Ubiquitous (1952-1999) Computing ►Chief Technologist Xerox PARC ►Began Project in 1988 Organizational & ►Weiser, M. "The Computer for the Twenty-First Task Social Issues Century”, Scientific American, 1991, 94-100 ►Mark Weiser’s vision ƒ Computers everywhere, disappearing/integrated in Design environment/objects around us ƒ Computer no longer isolates us from tasks/environment, no longer focus of attention Technology Humans ƒ Social impact: similar to writing: found everywhere from clothes labels to billboards ƒ Similar to electricity which surges invisibly through the walls of every home, office, car

Principles of Ubiquitous Computing Paradigms ►Getting computing “off the desktop” ƒ Connect with what else people do ƒ “Pervading” the physical world ƒ = “Pervasive”, “Ambient”, “Situated” ►Many ways to break the traditional PC model ƒ Many communities working hard Many different definitions Figure 1. The major trends in computing ƒ ►Paradigms of Ubiquitous Computing: “… the third wave in computing, just now beginning. ƒ Mobile / Wireless computing First were mainframes, each shared by lots of people. Now we are in the PC era, person and machine staring ƒ Hands-free UI / Intelligent environment uneasily at each other across the desktop. ƒ Disaggregated computing / Migrating UI Next comes ubiquitous computing, or the age of calm ƒ Location-sensitive data & services technology, when technology recedes into the ƒ Invisible computing background of our lives." ƒ Wearable computing

Desktop Computing Mobile Computing

Network Network

UI UI Processor Device Processor Device Data StoreBus Bus Data Store Data Store Differences w. desktop comp: ƒ Everything is smaller Bus provides speed, connection, ID, trust, synchrony ƒ Power is limited Processor assumes minimum suite of devices ƒ Network connection is wireless Key feature: User has to sit in chair ƒ Person is standing or moving! Wearable Computing Invisible Computing

ƒVariation on mobile computing Everything in the world is electronically active ƒNovel UI devices enable novel Your attention is on your task applications Of course, there are computers present ƒStand-alone VR (Virtual Reality) ƒ ƒWith location, AR () ƒ “Calm” or “ambient” computing Related: Personal memory devices; Physical icons

Calm Technology Hands-Free Computing ► Proposed by Mark Weiser & Seely Brown in 1995 ► “Calm”: technology that informs but doesn't demand our focus or attention Network ► Contrast with the way technology is designed now: in your face, highly interactive,using multiple modalities, etc ► Moves easily between center of attention & periphery UI speak ► Other word for Ambient Interfaces (Ishii) Processor ► Example: Device move ƒ dangling string representing network traffic (Jeremijenko) look ƒ Inner office windows Bus point ► Reading: http://sandbox.xerox.com/hypertext/ Data Store weiser/calmtech/calmtech.htm Data Store gesture Change UI devices to work at a distance No need to carry anything Mobility very limited

Intelligent Environment Wireless Connectivity

Network Wireless Access Point UI Device UI Proximity Processor Device ?

Bus UI Bus Device Data Store Device Proximity connectivity (e.g. Bluetooth): ƒ Per-device (no wires needed) Hands-free with greater area of coverage ƒ Ad hoc networking (peer-to-peer) Need connectivity for UI devices ƒ Locality of connection ≠ locality of access Need to dynamically select UI devices ƒ If device is static, you know where you are Location-Sensitive Computing Non-Traditional Devices

Computing experience changes as you move ƒ Migrating (“Follow-Me”) UI Why be limited to traditional computing devices? ƒ Location-Specific Data More pervasive, more subtle, more informative Need device to know where you are ƒ Cell phone, GPS, active badge, camera, … Enable novel applications – “immobile robot”

Ubiquitous Computing An interconnected system People Ubiquitous Computing = Mobile Computing + opens doors Intelligent Environment

User Interface generates TAN

incoming call updates location t n e S time, location e Applications m n e s g i n & Behaviors a g n a & M address book

M ce Environ o r Devices d alert, events e u l o in s ment e any weather service acoustic alerts g R school closings

Specialized Ubicomp Devices What makes technology disappear? ►LoveGety – Japan, 1998 (matchmaker) ►Psychological effect of learning (transparency) ƒ When people learn something sufficiently well, they ►Pirates! – Viktoria Institute (treasure hunt, combat) cease to be aware of it, they can focus beyond the ►Human Pacman – University of Singapore technology on new (true) goals ƒ Called “compiling” by H. Simon, or “periphery” by J. ►The ARQuake Project, at the University Seely Brown of Southern Australia ►Distribution of technology (distributed computing) ►EasyLiving - ►Physical invisibility (devices embedded everywhere) ►Location: must know where users are in order to provide appropriate services ƒ Outdoor: GPS, wireless/cellular networks ƒ Indoor: active badges, electronic tags, vision, motion detectors, keyboard activity ►Scale ►/automated functions Context-Aware Computing How? Automated Capture ►Context: any information that can be used to characterize the situation of an entity (who, where, ►Automated capturing everyday experiences when, what) ƒ Machines are better at some of these things than we are ►Computing services sense aspects of environment ►Multiple streams of information need to be (location, objects, identity, emotion,…) and tailor captured provided services ►Logging of events for later use ►Using context to: ƒ present relevant information: e.g., ‘smart’ museum guide ►Summarizing and making available to the user in ƒ perform an action automatically, e.g., print to nearest multiple formats printer ►Capturing of process? ƒ show an action that use can choose, e.g., want to phone ►But the number in this email? ƒ At what level to integrate information streams? ƒ Shall user be able to modify the captured streams? ƒ Which information is important?

Scale Scale ►Desktop screens vary by a factor of 2.5 in size and a ►Some interaction techniques for desktop will not factor of 4 in pixels work ►Ubicomp screens vary by factors of 100 in size and a ƒ Real estate problem on small devices factor of 625 in pixels ƒ Can’t reach menubar on wall-size devices Æ gesture/voice modality? ƒ Cell phone to interactive wall (3796 x 1436 pixels) Æ even nano-scale device? ►How do you ensure presentation consistency across different devices? ►How do you ensure privacy and security? ►Significant implications for design tools ƒ Moving target problem ƒ Tools for coordinating multiple, distributed, communicating devices

Scenario: Turning on the lights Identification vs. Privacy ►How? ►People enter the space as “unknowns” ƒ Flip a switch ►How to establish person’s identity? ƒ Dialog box with buttons ƒ Password by keyboard or voice ƒ Touch a map with lamp indicators ƒ “Turn on the room lights” ƒ Active badge or cardkey ƒ Make a funny gesture ƒ Scan eye / fingerprint / face ƒ It’s dark outside ►Privacy issues ƒ You enter the room, you sit down by that desk lamp ƒ Passive identification = unobtrusive use of cameras / voice ►How to activate? ƒ When your whole life is on the network, where does the ƒ Built in by hardware manufacturer information go? ƒ You program the behavior ƒ If no “active badge” assumed, people can’t physically turn ƒ Learn by repetition off identification ►Technological implications ƒ People need to trust the system ƒ Tracking: location/pose/activity ƒ Need clear policies, deeply rooted in system ƒ Sensors: gesture/voice/light recognition ƒ Keep sensitive data in secure places Privacy Issues Challenges and existing solutions ►One consequence of Ubicomp ►Challenges ƒ Way more data about us can be gathered (and used). ƒ Potentially a great thing for collaborative algorithms ƒ Unfamiliar environments ƒ Dynamic, ad hoc and shared (difficult to determine ►But, it’s potentially a great problem because... access rights) ƒ Protection of the user data generated and maintained by the environment ƒ No central control ƒ Privacy of individuals who use the environment ƒ High data rate (must be processed in real-time) ƒ Ability of legitimate users to make use of data recorded ƒ Collaborative applications in the environment ►Existing solutions (inadequate for ubicomp) ƒ Dealing with high-speed streams of data ƒ Based on authentication/authorization model Everyday Risks Extreme Risks ƒ Require a piece of running code to actively check permissions Friends, Family Employers Government Stalkers, Muggers ______ƒ Why won’t it work for ubicomp? Dynamic, distributed, environment; protecting agent can be bypassed. Over-protection Over-monitoring Civil liberties Well-being Social obligations Discrimination Personal safety Others? Embarrassment Reputation

Potential solutions (?) Other Problem – Localized Scalability ►Empower people so they can choose to share: ƒ the right information ►As smart spaces grow in sophistication, the ƒ with the right people or services intensity of interactions between a user’s personal ƒ at the right time computing space and his/her surroundings ►Clear value proposition increases. ►Simple and appropriate control and feedback ►This has severe bandwidth, energy, and distraction ►Plausible deniability implications for a ubicomp user. ►Limited retention of data ►The presence of multiple users will further ►Decentralized control complicate this problem. ►Special exceptions for emergencies ►Good system design has to achieve scalability by ►Make the data secure by themselves severely reducing interactions between distant ►In line with philosophy in cryptography: entities. ƒ Assume the adversary has access to the communication ƒ Obscurity is not security

Other Problem – Masking uneven Future Trends conditioning ►“Gap” between user and desktop widening ƒ Both in time and space ►Huge differences in the “smartness” of different ►Widespread ubicomp device proliferation environments — what is available in a well- ƒ Mobile phones achieve huge penetration worldwide Æ equipped conference room, office, or classroom need systems that are intuitive for many types of users may be more sophisticated than in other locations. ƒ Wall-sized ads, large display are parts of urban life ►This large dynamic range of “smartness” can be ƒ They are used in a variety of context: environmental, social, ethical, contextual factors become increasingly jarring to a user, detracting from the goal of important making pervasive computing technology invisible. ►Convergence of computing capabilities onto the ►One way to reduce the amount of variation seen by phone/PDA a user is to have his/her personal computing space ƒ Take photos, play music, record notes, etc. compensate for “dumb” environments. How? ►Our society is aging ƒ Accessibility of small devices will be an issue Research Responses ►Ubi-input ƒ “Learn once, write anywhere” ►Understand, sense, and adapt to “situational impairments” ►Sensors everywhere: Many things will need some rudimentary input ƒ Don’t want to learn a new technique for every new device ►Simple, extensible techniques applicable to a variety of devices ►Deliver education and medical information on portable devices ƒ Particularly in developing nations Æ ex. South Africa