SlideShare uma empresa Scribd logo
1 de 15
UBIQUITOUS COMPUTING: UX
WHEN THERE IS NO UI
Marc Resnick, Ph.D.
Human Factors and Information Design
Bentley University
mresnick@bentley.edu
humanfactors.blogspot.com
@PerformSol
Strategic Ubiquity
 Ubiquitious computing is not about making all of
the technology invisible. Invisible is often not a
good UX.
 Ubiquitous computing is transparent
◦ it retreats into the background and supports the experience
of flow with the contextual environment.
◦ it does not insert itself between the user and the
environment and demand attention.
The Internet of Things
 When entities in our environment can communicate
with each other and share their individual data, the
aggregate is smarter than the components.
Wisdom
Knowledge
Information
Data
The Internet of Things
3D-camera
views
body
sensors
climate
sensors
activity
monitors
Local IOT
calendar synch
local
IOT
social
recommendatio
ns
cloud
models
Global IOT
Global IoT – Glow Caps
Ubiquitous Computing
Input
• The mechanisms through which the system identifies
the context, which is used to determine what actions to
take (if any).
Output
• The mechanisms through which the system impacts
the context in the way that meets the objectives of the
system and/or user.
Setup
• Allows the system to establish objectives, preferences,
and other KPIs that might differ among contexts.
note – not all of these need to be individually ubiquitous –
ubiquity is NOT the objective, good user experience IS.
Ubiquitous User Experience
Compute ActuateSense
Partial ubiquity is often better
than none
Partial ubiquity is often better
than none
Shamelessly borrowed from nngroup newsletter
Smart Homes
Smart Cars
The Quantified Self
Social Gaming
UX Concerns
Conflict Security
Thank You!!

Mais conteúdo relacionado

Mais procurados

Inform- interacting with a dynamic shape display
Inform- interacting with a dynamic shape displayInform- interacting with a dynamic shape display
Inform- interacting with a dynamic shape displayHari Teja Joshi
 
Tangible User Interface Showcase
Tangible User Interface ShowcaseTangible User Interface Showcase
Tangible User Interface ShowcaseSimone Mora
 
Ubiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of ComputingUbiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of ComputingShiraz Shrestha
 
Separating Gesture Detection and Application Control Concerns with a Multimo...
Separating Gesture Detection and Application Control Concerns with a Multimo...Separating Gesture Detection and Application Control Concerns with a Multimo...
Separating Gesture Detection and Application Control Concerns with a Multimo...Luís Fernandes
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesJunie Kwon
 
9 Visualization In E Social Science
9 Visualization In E Social Science9 Visualization In E Social Science
9 Visualization In E Social ScienceWebometrics Class
 
Resource sharing in ubiquitous environment
Resource sharing in ubiquitous environmentResource sharing in ubiquitous environment
Resource sharing in ubiquitous environmentMuhammad Hussain
 
Distributed Systems @ Code Europe
Distributed Systems @ Code EuropeDistributed Systems @ Code Europe
Distributed Systems @ Code EuropeMichal Lukaszewski
 
Mitdigitalsixthsense
MitdigitalsixthsenseMitdigitalsixthsense
MitdigitalsixthsenseGraceB1019
 
M O V E M E N T
M O V E M E N TM O V E M E N T
M O V E M E N Tbretrana
 
Tangible Interaction & Interfaces
Tangible Interaction & InterfacesTangible Interaction & Interfaces
Tangible Interaction & InterfacesMarie Quién
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)MicheleNati
 
Media hack day: presenting social graph analysis tool
Media hack day: presenting social graph analysis toolMedia hack day: presenting social graph analysis tool
Media hack day: presenting social graph analysis toolNatalia Karbasova
 

Mais procurados (16)

Inform- interacting with a dynamic shape display
Inform- interacting with a dynamic shape displayInform- interacting with a dynamic shape display
Inform- interacting with a dynamic shape display
 
Tangible User Interface Showcase
Tangible User Interface ShowcaseTangible User Interface Showcase
Tangible User Interface Showcase
 
Ubiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of ComputingUbiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of Computing
 
Separating Gesture Detection and Application Control Concerns with a Multimo...
Separating Gesture Detection and Application Control Concerns with a Multimo...Separating Gesture Detection and Application Control Concerns with a Multimo...
Separating Gesture Detection and Application Control Concerns with a Multimo...
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App Services
 
9 Visualization In E Social Science
9 Visualization In E Social Science9 Visualization In E Social Science
9 Visualization In E Social Science
 
Resource sharing in ubiquitous environment
Resource sharing in ubiquitous environmentResource sharing in ubiquitous environment
Resource sharing in ubiquitous environment
 
Distributed Systems @ Code Europe
Distributed Systems @ Code EuropeDistributed Systems @ Code Europe
Distributed Systems @ Code Europe
 
Mitdigitalsixthsense
MitdigitalsixthsenseMitdigitalsixthsense
Mitdigitalsixthsense
 
Information and technology
Information and technologyInformation and technology
Information and technology
 
M O V E M E N T
M O V E M E N TM O V E M E N T
M O V E M E N T
 
Dan Schultz: Designing a strategy for mobile innovation
Dan Schultz: Designing a strategy for mobile innovationDan Schultz: Designing a strategy for mobile innovation
Dan Schultz: Designing a strategy for mobile innovation
 
Tangible Interaction & Interfaces
Tangible Interaction & InterfacesTangible Interaction & Interfaces
Tangible Interaction & Interfaces
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)
 
Media hack day: presenting social graph analysis tool
Media hack day: presenting social graph analysis toolMedia hack day: presenting social graph analysis tool
Media hack day: presenting social graph analysis tool
 

Semelhante a Ubiquitious Computing: UX When There is No UI

Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstractPriti Punia
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...Eswar Publications
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...LouisFrederickRakoto
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentationRameshkumar1829
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxanror264
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...Fread Mzee
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdardiannepatricia
 
Towards the Intelligent Internet of Everything
Towards the Intelligent Internet of EverythingTowards the Intelligent Internet of Everything
Towards the Intelligent Internet of EverythingRECAP Project
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotspreya772
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxNehaFatima30
 

Semelhante a Ubiquitious Computing: UX When There is No UI (20)

Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
 
Interaction Paradigms
Interaction ParadigmsInteraction Paradigms
Interaction Paradigms
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptx
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Elastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdarElastic cognitive systems 18 6-2015-dustdar
Elastic cognitive systems 18 6-2015-dustdar
 
Towards the Intelligent Internet of Everything
Towards the Intelligent Internet of EverythingTowards the Intelligent Internet of Everything
Towards the Intelligent Internet of Everything
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 

Mais de Marc Resnick

Gamification Debate at NY Tech UX
Gamification Debate at NY Tech UXGamification Debate at NY Tech UX
Gamification Debate at NY Tech UXMarc Resnick
 
How to achieve privacy AND security. Why force us to pick one?
How to achieve privacy AND security.  Why force us to pick one?How to achieve privacy AND security.  Why force us to pick one?
How to achieve privacy AND security. Why force us to pick one?Marc Resnick
 
Innovations in training
Innovations in trainingInnovations in training
Innovations in trainingMarc Resnick
 
The Impact of Advertising Location and User Task on the Emergence of Banner A...
The Impact of Advertising Location and User Task on the Emergence of Banner A...The Impact of Advertising Location and User Task on the Emergence of Banner A...
The Impact of Advertising Location and User Task on the Emergence of Banner A...Marc Resnick
 
2013 UX Day Design Charrette
2013 UX Day Design Charrette2013 UX Day Design Charrette
2013 UX Day Design CharretteMarc Resnick
 
Brain science in ux
Brain science in uxBrain science in ux
Brain science in uxMarc Resnick
 
Designing Large Information Spaces
Designing Large Information SpacesDesigning Large Information Spaces
Designing Large Information SpacesMarc Resnick
 

Mais de Marc Resnick (8)

Resnick poster
Resnick posterResnick poster
Resnick poster
 
Gamification Debate at NY Tech UX
Gamification Debate at NY Tech UXGamification Debate at NY Tech UX
Gamification Debate at NY Tech UX
 
How to achieve privacy AND security. Why force us to pick one?
How to achieve privacy AND security.  Why force us to pick one?How to achieve privacy AND security.  Why force us to pick one?
How to achieve privacy AND security. Why force us to pick one?
 
Innovations in training
Innovations in trainingInnovations in training
Innovations in training
 
The Impact of Advertising Location and User Task on the Emergence of Banner A...
The Impact of Advertising Location and User Task on the Emergence of Banner A...The Impact of Advertising Location and User Task on the Emergence of Banner A...
The Impact of Advertising Location and User Task on the Emergence of Banner A...
 
2013 UX Day Design Charrette
2013 UX Day Design Charrette2013 UX Day Design Charrette
2013 UX Day Design Charrette
 
Brain science in ux
Brain science in uxBrain science in ux
Brain science in ux
 
Designing Large Information Spaces
Designing Large Information SpacesDesigning Large Information Spaces
Designing Large Information Spaces
 

Último

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Último (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

Ubiquitious Computing: UX When There is No UI

  • 1. UBIQUITOUS COMPUTING: UX WHEN THERE IS NO UI Marc Resnick, Ph.D. Human Factors and Information Design Bentley University mresnick@bentley.edu humanfactors.blogspot.com @PerformSol
  • 2. Strategic Ubiquity  Ubiquitious computing is not about making all of the technology invisible. Invisible is often not a good UX.  Ubiquitous computing is transparent ◦ it retreats into the background and supports the experience of flow with the contextual environment. ◦ it does not insert itself between the user and the environment and demand attention.
  • 3. The Internet of Things  When entities in our environment can communicate with each other and share their individual data, the aggregate is smarter than the components. Wisdom Knowledge Information Data
  • 4. The Internet of Things 3D-camera views body sensors climate sensors activity monitors Local IOT calendar synch local IOT social recommendatio ns cloud models Global IOT
  • 5. Global IoT – Glow Caps
  • 6. Ubiquitous Computing Input • The mechanisms through which the system identifies the context, which is used to determine what actions to take (if any). Output • The mechanisms through which the system impacts the context in the way that meets the objectives of the system and/or user. Setup • Allows the system to establish objectives, preferences, and other KPIs that might differ among contexts. note – not all of these need to be individually ubiquitous – ubiquity is NOT the objective, good user experience IS.
  • 8. Partial ubiquity is often better than none
  • 9. Partial ubiquity is often better than none Shamelessly borrowed from nngroup newsletter