SlideShare a Scribd company logo
1 of 17
Download to read offline
CEWIT 2013
Visual Computing – Voice Driven Computing User Interface Design
Intelligent Product Solutions

WHO ARE WE?

UNRELENTING DEDICATION
TO GREAT PRODUCT DESIGN.

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

THOUGHT THROUGH.
REALLY.

JUST STRAIGHT TALK.
Wearable Computing Market Trends
“ABI  Research forecasts the wearable computing device market will grow to 485 million annual device shipments by 2018.”  
(ABIresearch, 2013)
“According  to IMS Research, the wearables market is poised to grow from 14 million devices shipped in 2011 to as many as
171 million units shipped by 2016.”  (Ballve, 2013)

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Evolution of Head Mounted Computers

1980’s

Present

Motorola HC1

Vuzix Smart Glasses M100
IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Evolution of Voice Driven Applications
• Automobiles

• Phone functions
• GPS navigation
• Media controls
• Radio controls
• General purpose computing for those in need
• Example: Voice activated GPS systems for the blind
• Smart phones
• Siri
• Google Voice

• Wearable computers
• Replaces mouse and keyboard

• Televisions?
• Replaces clunky remote

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Two Major Challenges w/ Speech Enabled UI
1. What are the features and are they obvious??

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

2. Phrasing
Voice Enabled UI on a Head Mounted Computer - Challenges
•
•
•
•
•
•
•
•

Speech recognition engine personality
Environmental issues (Noise)
Varying accents
Processing different vocabulary
Visual cues to commands – “What  do  I  say?”
Application layout & UI
Voice optimized application workflow
Security

“Item  7”  
“View  Library”

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Item  2”
SR Personality, Environmental (Noise), Accents, & Vocabulary

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Visual Cues – “What  Do  I  Say”?
1. Speech icon

2. Global Commands
•
•
•
•
•
•
•

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Main  Menu”
“View  Library”
“Get  Message”
“Camera  Feed”
“Request  Expert”
“Logout”
“Quit  Application”

3.  “My  Computer  Help
Application Layout & UI Design Methods – UX Storyboarding

Storyboards
Storyboardsare
used to consider
are used to
the system from
consider the
a human system from a
centered
human - point of
view.
centered
point of view.

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Application Layout & UI Design Methods – UX Workflows

CAMERA

Workflows
are used to
fully think
the UI
experience
through

LIBRARY

LOG IN

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

EXPERT
SESSION
Application Layout & UI Design Methods – UX Behavioral & Flow

The user
The user
experience is is
experience
carefully
carefully
considered by by
considered
creating specific
creating
detailed use
specific
cases for real
detailed use
user goals. real
cases for
user goals.

Library: Levels 1-4

Search by Voice

Main Menu

“Alpha,  Chapter…”
Final Selection
“View Document”
Content Specific

“Item  3,  Item  7,      
Item  5,  Item  3…”

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“View  Document”
Application Layout & UI Design Methods – UX System Logic: Speech Recognition

Session workflow
from the HC1
perspective.

Start
Program

Verify
connectivity
to server

Connection
successful

Pick
machine to
view

“Quit  
application”

View
Media

Log in to
server

Online &
waiting for
“View   command
Library”

“Item  X”

“Request  Expert”
Wait for
expert to
connect

Expert
voice
connect

View
Document

“Take  
snapshot”

“Camera  
feed”

“Video  
record”

Snapshot
Saved

Real Time
Session
Expert Active

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Log  out”

Video
Recording

Video
Streaming

Viewing
Camera

Camera Active
Security

Creating a
method to
log into the
system
with voice
as your
only input

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Maturing The UI Over Time

ORIGINAL

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

INTERMIDIATE

FINAL
Developing A Model That Spans Across Industries & Markets
MANUFACTURING

UTILITIES

ABC COMPANY
Category A (3)
Category A (3)

Category G (5)

Category B (2)
Category B (2)

Category H (11)

Category C (5)
Category C (5)

Category I (3)

Category D (13)
Category D (13)

Category J (6)

Category E (1)
Category E (1)

Category K (8)

Category F (22)
Category F (22)

Category L (16)

MILITARY MRO

EMERGENCY MEDICINE

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

VEHICLE REPAIR

HOSPITAL
References
ABIresearch (2013).  “Wearable  Computing  Devices,  Like  Apple’s  iWatch,  W ill  Exceed  485  Million  Annual  Shipments  by  2018.”  Online.  Available:  
https://www.abiresearch.com/press/wearable-computing-devices-like-apples-iwatch-will
Ballve,  M.  (2013).  “WEARABLE  COMPUTING:  Inside  The  New  Mobile  Market  That  Is  Taking  Shape.”  Online.  Available:
http://www.businessinsider.com/wearables-create-new-mobile-markets-2013-9

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

More Related Content

What's hot

Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Source Conference
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationYanivt
 
CNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device ManagementCNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device ManagementSam Bowne
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSalesforce Developers
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices Troy C. Fulton
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 James Wu
 
An Example of Speech Processing Program – Siri
An Example of Speech Processing Program – SiriAn Example of Speech Processing Program – Siri
An Example of Speech Processing Program – SiriFlorian Leibert
 
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarAmazon Web Services
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicIntel IT Center
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic KeyIBM Security
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologiesDavid Strom
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseEric Vétillard
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousIBM Security
 
CNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile paymentsCNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile paymentsSam Bowne
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkMartin Vigo
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 

What's hot (20)

Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate Presentation
 
CNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device ManagementCNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device Management
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
An Example of Speech Processing Program – Siri
An Example of Speech Processing Program – SiriAn Example of Speech Processing Program – Siri
An Example of Speech Processing Program – Siri
 
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema Ghanekar
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - Infographic
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-Enterprise
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
CNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile paymentsCNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile payments
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdk
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 

Viewers also liked

Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI worldStephen Gay
 
Understanding Voice User Interface Design
Understanding Voice User Interface DesignUnderstanding Voice User Interface Design
Understanding Voice User Interface DesignPronexus
 
Use Cases for Voice User Interface
Use Cases for Voice User InterfaceUse Cases for Voice User Interface
Use Cases for Voice User InterfaceStefan Ostwald
 
Conversational apps UX best practices
Conversational apps UX best practicesConversational apps UX best practices
Conversational apps UX best practicesMatthieu Varagnat
 
(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the HoodAmazon Web Services
 
EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016Michael Mendelson
 
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Enterprise UX Meetup
 
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoiceAnwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoiceStefan Ostwald
 
User Interface
User InterfaceUser Interface
User InterfaceIl-woo Lee
 
Voice Design Coaching programa Voice Design Branding
Voice Design Coaching   programa Voice Design BrandingVoice Design Coaching   programa Voice Design Branding
Voice Design Coaching programa Voice Design BrandingVoice Design Institute
 
Touch first and touch free designs
Touch first and touch free designsTouch first and touch free designs
Touch first and touch free designsKiran Challa
 
Natural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using KinectNatural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using KinectNitesh Bhatia
 
From Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsFrom Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsStefano Bussolon
 
Bussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhereBussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhereStefano Bussolon
 
Designing Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave IsbitskiDesigning Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave IsbitskiJessica Tams
 
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...Ralf Kienzler
 
How Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionHow Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionMarco Silva
 
The X factor - defining the concept of Experience
The X factor - defining the concept of ExperienceThe X factor - defining the concept of Experience
The X factor - defining the concept of ExperienceStefano Bussolon
 
Ride the Wave of Conversational UX
Ride the Wave of Conversational UXRide the Wave of Conversational UX
Ride the Wave of Conversational UXSolstice
 

Viewers also liked (20)

Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 
Understanding Voice User Interface Design
Understanding Voice User Interface DesignUnderstanding Voice User Interface Design
Understanding Voice User Interface Design
 
Use Cases for Voice User Interface
Use Cases for Voice User InterfaceUse Cases for Voice User Interface
Use Cases for Voice User Interface
 
Conversational apps UX best practices
Conversational apps UX best practicesConversational apps UX best practices
Conversational apps UX best practices
 
(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood
 
The Human Interface
The Human InterfaceThe Human Interface
The Human Interface
 
EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016
 
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoiceAnwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
 
User Interface
User InterfaceUser Interface
User Interface
 
Voice Design Coaching programa Voice Design Branding
Voice Design Coaching   programa Voice Design BrandingVoice Design Coaching   programa Voice Design Branding
Voice Design Coaching programa Voice Design Branding
 
Touch first and touch free designs
Touch first and touch free designsTouch first and touch free designs
Touch first and touch free designs
 
Natural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using KinectNatural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using Kinect
 
From Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsFrom Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious Tags
 
Bussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhereBussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhere
 
Designing Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave IsbitskiDesigning Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave Isbitski
 
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
 
How Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionHow Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer Interaction
 
The X factor - defining the concept of Experience
The X factor - defining the concept of ExperienceThe X factor - defining the concept of Experience
The X factor - defining the concept of Experience
 
Ride the Wave of Conversational UX
Ride the Wave of Conversational UXRide the Wave of Conversational UX
Ride the Wave of Conversational UX
 

Similar to Voice Driven User Interface Design

Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...Codemotion
 
Cognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićCognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićBosnia Agile
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive ComputingPietro Leo
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyITCamp
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distributionThorsten Schroeer
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingOpen Interconnect Consortium
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
20160813 102-59-kim youngwook
20160813 102-59-kim youngwook20160813 102-59-kim youngwook
20160813 102-59-kim youngwookitproman35
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetAbhinav Mishra
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of ThingsOmkar Shinge
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016 Kevin Murphy
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantIBM
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantAnimesh Singh
 
Gartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouchGartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouchSplunk
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunk
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsLaurie Lamberth
 

Similar to Voice Driven User Interface Design (20)

Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
 
Cognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićCognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz Saračević
 
AI in the Enterprise
AI in the EnterpriseAI in the Enterprise
AI in the Enterprise
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
20160813 102-59-kim youngwook
20160813 102-59-kim youngwook20160813 102-59-kim youngwook
20160813 102-59-kim youngwook
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
 
Gartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouchGartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouch
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of Things
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Voice Driven User Interface Design

  • 1. CEWIT 2013 Visual Computing – Voice Driven Computing User Interface Design
  • 2. Intelligent Product Solutions WHO ARE WE? UNRELENTING DEDICATION TO GREAT PRODUCT DESIGN. IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. THOUGHT THROUGH. REALLY. JUST STRAIGHT TALK.
  • 3. Wearable Computing Market Trends “ABI  Research forecasts the wearable computing device market will grow to 485 million annual device shipments by 2018.”   (ABIresearch, 2013) “According  to IMS Research, the wearables market is poised to grow from 14 million devices shipped in 2011 to as many as 171 million units shipped by 2016.”  (Ballve, 2013) IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 4. Evolution of Head Mounted Computers 1980’s Present Motorola HC1 Vuzix Smart Glasses M100 IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 5. Evolution of Voice Driven Applications • Automobiles • Phone functions • GPS navigation • Media controls • Radio controls • General purpose computing for those in need • Example: Voice activated GPS systems for the blind • Smart phones • Siri • Google Voice • Wearable computers • Replaces mouse and keyboard • Televisions? • Replaces clunky remote IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 6. Two Major Challenges w/ Speech Enabled UI 1. What are the features and are they obvious?? IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. 2. Phrasing
  • 7. Voice Enabled UI on a Head Mounted Computer - Challenges • • • • • • • • Speech recognition engine personality Environmental issues (Noise) Varying accents Processing different vocabulary Visual cues to commands – “What  do  I  say?” Application layout & UI Voice optimized application workflow Security “Item  7”   “View  Library” IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Item  2”
  • 8. SR Personality, Environmental (Noise), Accents, & Vocabulary IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 9. Visual Cues – “What  Do  I  Say”? 1. Speech icon 2. Global Commands • • • • • • • IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Main  Menu” “View  Library” “Get  Message” “Camera  Feed” “Request  Expert” “Logout” “Quit  Application” 3.  “My  Computer  Help
  • 10. Application Layout & UI Design Methods – UX Storyboarding Storyboards Storyboardsare used to consider are used to the system from consider the a human system from a centered human - point of view. centered point of view. IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 11. Application Layout & UI Design Methods – UX Workflows CAMERA Workflows are used to fully think the UI experience through LIBRARY LOG IN IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. EXPERT SESSION
  • 12. Application Layout & UI Design Methods – UX Behavioral & Flow The user The user experience is is experience carefully carefully considered by by considered creating specific creating detailed use specific cases for real detailed use user goals. real cases for user goals. Library: Levels 1-4 Search by Voice Main Menu “Alpha,  Chapter…” Final Selection “View Document” Content Specific “Item  3,  Item  7,       Item  5,  Item  3…” IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “View  Document”
  • 13. Application Layout & UI Design Methods – UX System Logic: Speech Recognition Session workflow from the HC1 perspective. Start Program Verify connectivity to server Connection successful Pick machine to view “Quit   application” View Media Log in to server Online & waiting for “View   command Library” “Item  X” “Request  Expert” Wait for expert to connect Expert voice connect View Document “Take   snapshot” “Camera   feed” “Video   record” Snapshot Saved Real Time Session Expert Active IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Log  out” Video Recording Video Streaming Viewing Camera Camera Active
  • 14. Security Creating a method to log into the system with voice as your only input IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 15. Maturing The UI Over Time ORIGINAL IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. INTERMIDIATE FINAL
  • 16. Developing A Model That Spans Across Industries & Markets MANUFACTURING UTILITIES ABC COMPANY Category A (3) Category A (3) Category G (5) Category B (2) Category B (2) Category H (11) Category C (5) Category C (5) Category I (3) Category D (13) Category D (13) Category J (6) Category E (1) Category E (1) Category K (8) Category F (22) Category F (22) Category L (16) MILITARY MRO EMERGENCY MEDICINE IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. VEHICLE REPAIR HOSPITAL
  • 17. References ABIresearch (2013).  “Wearable  Computing  Devices,  Like  Apple’s  iWatch,  W ill  Exceed  485  Million  Annual  Shipments  by  2018.”  Online.  Available:   https://www.abiresearch.com/press/wearable-computing-devices-like-apples-iwatch-will Ballve,  M.  (2013).  “WEARABLE  COMPUTING:  Inside  The  New  Mobile  Market  That  Is  Taking  Shape.”  Online.  Available: http://www.businessinsider.com/wearables-create-new-mobile-markets-2013-9 IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.