Month: February 2006

Wearables in 2005

An article I wrote for the Wearable Computing column of IEEE Pervasive Computing magazine just came out, and highlights some of the projects at last year’s ISWC conference. Here’s the intro:

Wearables in 2005
Bradley Rhodes and Kenji Mase

In July 1996, one year before the first International Symposium on Wearable Computers, DARPA sponsored a workshop entitled “Wearables in 2005” (www.darpa.mil/MTO/Displays/Wear2005). Attendees predicted how wearable computers might be used in 2005 and identified key technology gaps that needed to be filled to make their vision a reality. In October 2005, the 9th Annual International Symposium on Wearable Computing was held in Osaka, Japan, the first to be held in Asia. Participants presented a wide range of research from both industry and academia, spanning 13 countries and weaving together such diverse fields as interface design, hardware and systems, gesture and pattern recognition, textiles, augmented reality, and clothing design.1 Many of the themes would have sounded familiar in 1996, with continuing improvements in ergonomics and power management as well as gesture recognition and augmented reality.

As you would hope, the field has also developed in new directions in the past decade, with a much greater emphasis on large-scale recording and annotation of everyday activities, on the science and engineering of clothing design, and on performing thorough quantitative evaluations of potential input devices. We have also seen a large increase in the use of accelerometers, smart phones, and RFID readers as researchers leverage continuing drops in cost and size in the consumer electronics world.

As the largest primary conference for wearables researchers, ISWC provides a good snapshot of the state of the field. So, with the benefit of hindsight, here are some highlights of how wearables research actually looked in 2005.

The IEEE copy is here, and I’ve also got an HTML copy on my publications page.

and a cow

I turned on BBC radio yesterday just in time to hear the newscaster say “and a purebred Guernsey cow. Now on to sports…” I caught the reference, but at the time had no idea what he was talking about

Keeping the djinni out of the bottle

In many ways I see the problems with Google’s centralization as just another facet of a tension that has existed since the Internet started: the tension between the decentralized “every end-user is his own service provider” model and the centralized fiefdom model where you sign up for one of a handful of service providers. I think it was the coming of the Web in the early ’90s that finally tipped the scale in favor of the decentralized model, and as a result we saw an explosion of URLs and email addresses that weren’t only from AOL, CompuServe or Prodigy. This, I think, was all for the better. But now the proliferation of GMail addresses and Google Base scare me precisely because they smack a little too much of the fiefdom model we so wisely avoided 15 years ago.

Google Desktop widens the privacy hole

EFF is sounding a warning about Google Desktop’s latest Search Remote Computers function. The function itself sounds nice: one search command to search all your documents and viewed webpages regardless of what computer they’re on. Trouble is, Google does it by uploading all those sensitive documents to their own servers in case your laptop or other computers are off-line.

I think Google has a pretty good moral compasses, but (as I mentioned when GMail came out) there are fundamental risks with this sort of centralized system regardless of the trustworthiness of the company running them. As EFF’s alert points out, many legal protections enjoyed by information stored on your own home computer are lost when stored with an online service provider:

The privacy problem arises because the Electronic Communication Privacy Act of 1986, or ECPA, gives only limited privacy protection to emails and other files that are stored with online service providers—much less privacy than the legal protections for the same information when it’s on your computer at home. And even that lower level of legal protection could disappear if Google uses your data for marketing purposes. Google says it is not yet scanning the files it copies from your hard drive in order to serve targeted advertising, but it hasn’t ruled out the possibility, and Google’s current privacy policy appears to allow it.

I can imagine other legal and practical questions as well. For example, if Google Desktop wound up uploading a researcher’s company-confidential tech reports, would that count as “disclosure” and thus prevent him from filing for a patent on his work? And if a laptop running the software is opened in a foreign airport (e.g. China), can the local Google office be subjected to subpoena under that country’s own laws?

Iconoclasts in glass houses

The statements from the Vatican I linked to last post include a comment from Cardinal Achille Silvestrini that’s worth highlighting:

The cardinal said secular societies should not assume a right to offend religious sentiments. He noted that many countries consider it illegal to offend their national flag and asked, “Shouldn’t we consider religious symbols on an equal level with the symbols of secular institutions?”

This is a good point; it is far to easy to defend the right to satire or denigrate the other people’s images while holding that our own images and ideals should be off-limits. However, I take away a different lesson than he intended, namely that we all must be wary of the power our own symbols have over us.

If I may stereotype the argument as religion vs. secular culture, both sides of have blind spots when it comes to our symbols. We secularists are so invested in the myth that we are rational beings that we are blind to the very real power our icons and our media have over us, and that blindness makes us vulnerable. The result is Madison Avenue, Hollywood and politicians who can play us like a musical instrument. Religion, on the other hand, is so aware of the power of icons that they have become hostage to the defense of their own. The result is hair-trigger sensitivity, where a simple cartoon or perceived slight in the wording on a greeting card can spark boycotts and even violence.

Back to their roots…

The Vatican weighs in on the cartoons of Muhammad:

VATICAN CITY (CNS) — The Vatican, commenting on a series of satirical newspaper cartoons that have outraged Muslims, said freedom of expression does not include the right to offend religious sentiments.

…The Vatican suggested, however, that where free speech crosses the line and becomes offensive to a religion, national authorities “can and should” intervene.

Pretty strong words for a religion that only a few centuries ago was being oppressed by various national authorities because their very existence was considered offensive.

(Link by way of The Volokh Conspiracy…)

Fon

From CNN Money:

NEW YORK (FORTUNE) – Aiming to increase access to the Internet, particularly for people away from home, Google, Skype and other leading Internet investors Sunday announced a $21.5 million investment in an innovative new Internet access network called Fon.

The company, founded by Spanish entrepreneur Martin Varsavsky, aims to build a network of WiFi hotspots far larger than those from companies like T-Mobile and Swisscom, none of which have more than 30,000 hotspots worldwide.

Fon aims to exceed that in its first year, and to have one million hotspots in four years. It hopes to achieve this by getting individuals and businesses to contribute their own hotspots to the network in exchange for getting access wherever they go. Those who contribute access get to use the access of others.

If Fon comes through with a simple-to-install and manage setup I can see this idea really gaining traction — it sounds like he’s got the right level of incentive to end-users who donate their bandwidth, and the technology for charging non-members for hotspots is already tried & tested. (Heck, if it works well I’d pay $25 just to get his “use only 50% of your bandwidth on outsiders” software; I keep thinking something like that must exist, but I’ve yet to find one.)

Long as he can jump-start the process and can convince ISPs to let him in on a racket they’d love to control themselves I’d say he’s got a good chance. (I see he’s already signed on Speakeasy in the US, though they also have one of the most liberal wireless sharing policies around so others may be a harder sell.)