SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
CEWIT 2013
Visual Computing – Voice Driven Computing User Interface Design
Intelligent Product Solutions

WHO ARE WE?

UNRELENTING DEDICATION
TO GREAT PRODUCT DESIGN.

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

THOUGHT THROUGH.
REALLY.

JUST STRAIGHT TALK.
Wearable Computing Market Trends
“ABI  Research forecasts the wearable computing device market will grow to 485 million annual device shipments by 2018.”  
(ABIresearch, 2013)
“According  to IMS Research, the wearables market is poised to grow from 14 million devices shipped in 2011 to as many as
171 million units shipped by 2016.”  (Ballve, 2013)

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Evolution of Head Mounted Computers

1980’s

Present

Motorola HC1

Vuzix Smart Glasses M100
IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Evolution of Voice Driven Applications
• Automobiles

• Phone functions
• GPS navigation
• Media controls
• Radio controls
• General purpose computing for those in need
• Example: Voice activated GPS systems for the blind
• Smart phones
• Siri
• Google Voice

• Wearable computers
• Replaces mouse and keyboard

• Televisions?
• Replaces clunky remote

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Two Major Challenges w/ Speech Enabled UI
1. What are the features and are they obvious??

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

2. Phrasing
Voice Enabled UI on a Head Mounted Computer - Challenges
•
•
•
•
•
•
•
•

Speech recognition engine personality
Environmental issues (Noise)
Varying accents
Processing different vocabulary
Visual cues to commands – “What  do  I  say?”
Application layout & UI
Voice optimized application workflow
Security

“Item  7”  
“View  Library”

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Item  2”
SR Personality, Environmental (Noise), Accents, & Vocabulary

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Visual Cues – “What  Do  I  Say”?
1. Speech icon

2. Global Commands
•
•
•
•
•
•
•

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Main  Menu”
“View  Library”
“Get  Message”
“Camera  Feed”
“Request  Expert”
“Logout”
“Quit  Application”

3.  “My  Computer  Help
Application Layout & UI Design Methods – UX Storyboarding

Storyboards
Storyboardsare
used to consider
are used to
the system from
consider the
a human system from a
centered
human - point of
view.
centered
point of view.

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Application Layout & UI Design Methods – UX Workflows

CAMERA

Workflows
are used to
fully think
the UI
experience
through

LIBRARY

LOG IN

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

EXPERT
SESSION
Application Layout & UI Design Methods – UX Behavioral & Flow

The user
The user
experience is is
experience
carefully
carefully
considered by by
considered
creating specific
creating
detailed use
specific
cases for real
detailed use
user goals. real
cases for
user goals.

Library: Levels 1-4

Search by Voice

Main Menu

“Alpha,  Chapter…”
Final Selection
“View Document”
Content Specific

“Item  3,  Item  7,      
Item  5,  Item  3…”

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“View  Document”
Application Layout & UI Design Methods – UX System Logic: Speech Recognition

Session workflow
from the HC1
perspective.

Start
Program

Verify
connectivity
to server

Connection
successful

Pick
machine to
view

“Quit  
application”

View
Media

Log in to
server

Online &
waiting for
“View   command
Library”

“Item  X”

“Request  Expert”
Wait for
expert to
connect

Expert
voice
connect

View
Document

“Take  
snapshot”

“Camera  
feed”

“Video  
record”

Snapshot
Saved

Real Time
Session
Expert Active

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Log  out”

Video
Recording

Video
Streaming

Viewing
Camera

Camera Active
Security

Creating a
method to
log into the
system
with voice
as your
only input

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Maturing The UI Over Time

ORIGINAL

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

INTERMIDIATE

FINAL
Developing A Model That Spans Across Industries & Markets
MANUFACTURING

UTILITIES

ABC COMPANY
Category A (3)
Category A (3)

Category G (5)

Category B (2)
Category B (2)

Category H (11)

Category C (5)
Category C (5)

Category I (3)

Category D (13)
Category D (13)

Category J (6)

Category E (1)
Category E (1)

Category K (8)

Category F (22)
Category F (22)

Category L (16)

MILITARY MRO

EMERGENCY MEDICINE

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

VEHICLE REPAIR

HOSPITAL
References
ABIresearch (2013).  “Wearable  Computing  Devices,  Like  Apple’s  iWatch,  W ill  Exceed  485  Million  Annual  Shipments  by  2018.”  Online.  Available:  
https://www.abiresearch.com/press/wearable-computing-devices-like-apples-iwatch-will
Ballve,  M.  (2013).  “WEARABLE  COMPUTING:  Inside  The  New  Mobile  Market  That  Is  Taking  Shape.”  Online.  Available:
http://www.businessinsider.com/wearables-create-new-mobile-markets-2013-9

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

Mais conteúdo relacionado

Mais procurados

Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Source Conference
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationYanivt
 
CNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device ManagementCNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device ManagementSam Bowne
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSalesforce Developers
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices Troy C. Fulton
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 James Wu
 
An Example of Speech Processing Program – Siri
An Example of Speech Processing Program – SiriAn Example of Speech Processing Program – Siri
An Example of Speech Processing Program – SiriFlorian Leibert
 
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarAmazon Web Services
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicIntel IT Center
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseEric Vétillard
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
CNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile paymentsCNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile paymentsSam Bowne
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkMartin Vigo
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 

Mais procurados (20)

Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate Presentation
 
CNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device ManagementCNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device Management
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
An Example of Speech Processing Program – Siri
An Example of Speech Processing Program – SiriAn Example of Speech Processing Program – Siri
An Example of Speech Processing Program – Siri
 
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema Ghanekar
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - Infographic
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-Enterprise
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
CNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile paymentsCNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile payments
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdk
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 

Destaque

Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI worldStephen Gay
 
Understanding Voice User Interface Design
Understanding Voice User Interface DesignUnderstanding Voice User Interface Design
Understanding Voice User Interface DesignPronexus
 
Use Cases for Voice User Interface
Use Cases for Voice User InterfaceUse Cases for Voice User Interface
Use Cases for Voice User InterfaceStefan Ostwald
 
Conversational apps UX best practices
Conversational apps UX best practicesConversational apps UX best practices
Conversational apps UX best practicesMatthieu Varagnat
 
(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the HoodAmazon Web Services
 
EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016Michael Mendelson
 
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Enterprise UX Meetup
 
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoiceAnwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoiceStefan Ostwald
 
User Interface
User InterfaceUser Interface
User InterfaceIl-woo Lee
 
Voice Design Coaching programa Voice Design Branding
Voice Design Coaching   programa Voice Design BrandingVoice Design Coaching   programa Voice Design Branding
Voice Design Coaching programa Voice Design BrandingVoice Design Institute
 
Touch first and touch free designs
Touch first and touch free designsTouch first and touch free designs
Touch first and touch free designsKiran Challa
 
Natural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using KinectNatural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using KinectNitesh Bhatia
 
From Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsFrom Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsStefano Bussolon
 
Bussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhereBussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhereStefano Bussolon
 
Designing Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave IsbitskiDesigning Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave IsbitskiJessica Tams
 
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...Ralf Kienzler
 
How Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionHow Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionMarco Silva
 
The X factor - defining the concept of Experience
The X factor - defining the concept of ExperienceThe X factor - defining the concept of Experience
The X factor - defining the concept of ExperienceStefano Bussolon
 
Ride the Wave of Conversational UX
Ride the Wave of Conversational UXRide the Wave of Conversational UX
Ride the Wave of Conversational UXSolstice
 

Destaque (20)

Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 
Understanding Voice User Interface Design
Understanding Voice User Interface DesignUnderstanding Voice User Interface Design
Understanding Voice User Interface Design
 
Use Cases for Voice User Interface
Use Cases for Voice User InterfaceUse Cases for Voice User Interface
Use Cases for Voice User Interface
 
Conversational apps UX best practices
Conversational apps UX best practicesConversational apps UX best practices
Conversational apps UX best practices
 
(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood
 
The Human Interface
The Human InterfaceThe Human Interface
The Human Interface
 
EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016
 
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoiceAnwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
 
User Interface
User InterfaceUser Interface
User Interface
 
Voice Design Coaching programa Voice Design Branding
Voice Design Coaching   programa Voice Design BrandingVoice Design Coaching   programa Voice Design Branding
Voice Design Coaching programa Voice Design Branding
 
Touch first and touch free designs
Touch first and touch free designsTouch first and touch free designs
Touch first and touch free designs
 
Natural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using KinectNatural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using Kinect
 
From Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsFrom Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious Tags
 
Bussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhereBussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhere
 
Designing Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave IsbitskiDesigning Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave Isbitski
 
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
 
How Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionHow Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer Interaction
 
The X factor - defining the concept of Experience
The X factor - defining the concept of ExperienceThe X factor - defining the concept of Experience
The X factor - defining the concept of Experience
 
Ride the Wave of Conversational UX
Ride the Wave of Conversational UXRide the Wave of Conversational UX
Ride the Wave of Conversational UX
 

Semelhante a Voice Driven User Interface Design

Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...Codemotion
 
Cognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićCognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićBosnia Agile
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive ComputingPietro Leo
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyITCamp
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distributionThorsten Schroeer
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingOpen Interconnect Consortium
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
20160813 102-59-kim youngwook
20160813 102-59-kim youngwook20160813 102-59-kim youngwook
20160813 102-59-kim youngwookitproman35
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetAbhinav Mishra
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of ThingsOmkar Shinge
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016 Kevin Murphy
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantIBM
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantAnimesh Singh
 
Gartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouchGartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouchSplunk
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunk
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsLaurie Lamberth
 

Semelhante a Voice Driven User Interface Design (20)

Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
 
Cognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićCognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz Saračević
 
AI in the Enterprise
AI in the EnterpriseAI in the Enterprise
AI in the Enterprise
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
20160813 102-59-kim youngwook
20160813 102-59-kim youngwook20160813 102-59-kim youngwook
20160813 102-59-kim youngwook
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
 
Gartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouchGartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouch
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of Things
 

Último

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 

Último (20)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 

Voice Driven User Interface Design

  • 1. CEWIT 2013 Visual Computing – Voice Driven Computing User Interface Design
  • 2. Intelligent Product Solutions WHO ARE WE? UNRELENTING DEDICATION TO GREAT PRODUCT DESIGN. IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. THOUGHT THROUGH. REALLY. JUST STRAIGHT TALK.
  • 3. Wearable Computing Market Trends “ABI  Research forecasts the wearable computing device market will grow to 485 million annual device shipments by 2018.”   (ABIresearch, 2013) “According  to IMS Research, the wearables market is poised to grow from 14 million devices shipped in 2011 to as many as 171 million units shipped by 2016.”  (Ballve, 2013) IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 4. Evolution of Head Mounted Computers 1980’s Present Motorola HC1 Vuzix Smart Glasses M100 IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 5. Evolution of Voice Driven Applications • Automobiles • Phone functions • GPS navigation • Media controls • Radio controls • General purpose computing for those in need • Example: Voice activated GPS systems for the blind • Smart phones • Siri • Google Voice • Wearable computers • Replaces mouse and keyboard • Televisions? • Replaces clunky remote IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 6. Two Major Challenges w/ Speech Enabled UI 1. What are the features and are they obvious?? IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. 2. Phrasing
  • 7. Voice Enabled UI on a Head Mounted Computer - Challenges • • • • • • • • Speech recognition engine personality Environmental issues (Noise) Varying accents Processing different vocabulary Visual cues to commands – “What  do  I  say?” Application layout & UI Voice optimized application workflow Security “Item  7”   “View  Library” IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Item  2”
  • 8. SR Personality, Environmental (Noise), Accents, & Vocabulary IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 9. Visual Cues – “What  Do  I  Say”? 1. Speech icon 2. Global Commands • • • • • • • IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Main  Menu” “View  Library” “Get  Message” “Camera  Feed” “Request  Expert” “Logout” “Quit  Application” 3.  “My  Computer  Help
  • 10. Application Layout & UI Design Methods – UX Storyboarding Storyboards Storyboardsare used to consider are used to the system from consider the a human system from a centered human - point of view. centered point of view. IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 11. Application Layout & UI Design Methods – UX Workflows CAMERA Workflows are used to fully think the UI experience through LIBRARY LOG IN IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. EXPERT SESSION
  • 12. Application Layout & UI Design Methods – UX Behavioral & Flow The user The user experience is is experience carefully carefully considered by by considered creating specific creating detailed use specific cases for real detailed use user goals. real cases for user goals. Library: Levels 1-4 Search by Voice Main Menu “Alpha,  Chapter…” Final Selection “View Document” Content Specific “Item  3,  Item  7,       Item  5,  Item  3…” IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “View  Document”
  • 13. Application Layout & UI Design Methods – UX System Logic: Speech Recognition Session workflow from the HC1 perspective. Start Program Verify connectivity to server Connection successful Pick machine to view “Quit   application” View Media Log in to server Online & waiting for “View   command Library” “Item  X” “Request  Expert” Wait for expert to connect Expert voice connect View Document “Take   snapshot” “Camera   feed” “Video   record” Snapshot Saved Real Time Session Expert Active IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Log  out” Video Recording Video Streaming Viewing Camera Camera Active
  • 14. Security Creating a method to log into the system with voice as your only input IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 15. Maturing The UI Over Time ORIGINAL IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. INTERMIDIATE FINAL
  • 16. Developing A Model That Spans Across Industries & Markets MANUFACTURING UTILITIES ABC COMPANY Category A (3) Category A (3) Category G (5) Category B (2) Category B (2) Category H (11) Category C (5) Category C (5) Category I (3) Category D (13) Category D (13) Category J (6) Category E (1) Category E (1) Category K (8) Category F (22) Category F (22) Category L (16) MILITARY MRO EMERGENCY MEDICINE IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. VEHICLE REPAIR HOSPITAL
  • 17. References ABIresearch (2013).  “Wearable  Computing  Devices,  Like  Apple’s  iWatch,  W ill  Exceed  485  Million  Annual  Shipments  by  2018.”  Online.  Available:   https://www.abiresearch.com/press/wearable-computing-devices-like-apples-iwatch-will Ballve,  M.  (2013).  “WEARABLE  COMPUTING:  Inside  The  New  Mobile  Market  That  Is  Taking  Shape.”  Online.  Available: http://www.businessinsider.com/wearables-create-new-mobile-markets-2013-9 IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.