SlideShare a Scribd company logo
1 of 29
Download to read offline
Ubiquitous Interactions
        Ilya Shmorgun
A Complex World
http://inqb8tor.com, accessed 28.11.2012
New Types of
          Interaction
• Our activities are supported by a wide
  range of devices and software.
• Our devices are capable of sensing the
  context of our activities.
• Our devices and services are still being
  designed in isolation.
Camera

                                                              GPS and GLONASS

                                                              Ambient light sensor

                                                              Proximity sensor

                                                              Accelerometer

                                                              Three-axis gyroscope

                                                              Digital compass

                                                              WiFi

                                                              3G and EDGE

                                                              Bluetooth



http://www.apple.com/iphone/specs.html, accessed 28.11.2012
Ubiquitous Computing
Post-Desktop Model of
                      HCI
                • Information processing is integrated into
                      everyday objects [1].
                • Ubiquitous computing is subsuming
                      traditional computing paradigms, for
                      example desktop and mobile computing
                      [2].


1. Zhao, R., Wang, J.:Visualizing the research on pervasive and ubiquitous computing. Scientometrics 86(3), 593–612 (2011)
2. Greenfield, A.: Everyware: The Dawning Age of Ubiquitous Computing. New Riders Publishing, 1st edn. (Mar 2006)
Invisible Computing
                • Interaction with computers should be
                      more like interaction with the physical
                      world [1].
                • Users should be able to sense and control
                      what directly interests them [2].
                • Our devices remain the focus of attention
                      instead of fading into the background.
1. Abowd, G., Mynatt, E.: Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human
   Interaction (TOCHI) 7(1), 29–58 (2000)
2. Roussos, G., Musolesi, M., Magoulas, G.D.: Human behavior in ubiquitous environments: Experience and interaction design. Pervasive and
   Mobile Computing 6(5), 497–498 (Oct 2010)
http://www.flickr.com/photos/biligiri/1844862632/, accessed 11.01.2013
People and Computers

             • Previously a ”one-to-one” relationship, one
                  technology - one application - one user.
             • Nowadays “many-to-many”, with ever-
                  changing configurations of devices,
                  applications, and users.



Brodersen, C., Bødker, S., Klokmose, C.: Ubiquitous substitution. Human-Computer Interaction–INTERACT 2007 pp. 179–192 (2007)
http://www.flickr.com/photos/billyquach/5705614659/, accessed 14.01.2013
Context

                • Any information, which characterizes the
                      situation of a person, a place or an object,
                      relevant to the interaction between a user
                      and an application [1].
                • Ubiquitous computing as ”a technology of
                      context” [2].


1. Chen, G., Kotz, D.: A survey of context-aware mobile computing research (2000)
2. Dourish,P.: Where the Action Is: The Foundations of Embodied Interaction (Bradford Books). The MIT Press, new ed edn. (Aug 2004)
Types of Context

              • Where you are.
              • Who you are with.
              • What resources are nearby.

Schilit, B., Adams, N., Want, R.: Context-aware computing applications (1994)
wn apps                                   Unsatisfactory state                   Stable state


seen as
                                                                       ?
Artifact
  ‘how’
pending
ng that
reading

s men-
 deeper
ble dy-
                                                                 Excited state



                    Figure 2. The states of the artifact ecology. In the unsatisfactory
gies are
                    state the current artifact ecology no longer lives up to the users
 sms of S., Klokmose, C.N.: Dynamics in artifact ecologies (2012)
   Bødker,
Ubiquitous Interactions
Definition


               Interactions in the context of ubiquitous
               computing, which include multiple, dynamic,
               and distributed interfaces.




Klokmose, C.N.: An Instrumental Paradigm for Ubiquitous Interaction. DHRS 2006 p. 33 (2006)
http://www.xbox.com/en-US/smartglass, accessed 14.01.2013
Properties
• Occurring all the time
• Occurring everywhere
• Occurring on any device with ease of
  substituting devices when necessary
• Being transparent
• Being informed by context
Properties
• Occurring all the time
• Occurring everywhere
• Occurring on any device with ease of
  substituting devices when necessary
• Being transparent
• Being informed by context
Properties
• Occurring all the time
• Occurring everywhere
• Occurring on any device with ease of
  substituting devices when necessary
• Being transparent
• Being informed by context
Smartphone   Tablet   Laptop   Desktop

 Communication
                       96.1%      96.9%    94.5%     94.4%
    tools

Social networking      90.9%      84.4%    87.9%     90.7%

Office applications     84.4%      90.6%    85.7%     85.2%

   File sharing        71.4%      68.8%    65.9%     70.4%

    Calendars          62.3%      68.8%    54.9%     61.1%

     Reading           51.9%      62.5%    47.3%     48.1%

    Blogging           48.1%      46.9%    42.9%     40.7%

   Note-taking         48.1%      43.8%    42.9%     44.4%

Task management        40.3%      46.9%    37.4%     37%
https://www.apple.com/osx/whats-new/, accessed 11.01.2013
http://www.engadget.com/2011/08/09/facebook-introduces-separate-messenger-app-for-iphone-and-androi/, accessed 11.01.2013
Smartphone   Tablet   Laptop   Desktop

     Reading emails           96.1%      62.5%    96.7%     87%

 Answering / composing
                              76.6%      56.3%    93.4%     79.6%
        emails

   Saving draft emails        46.8%      43.8%    84.6%     72.2%

     Attaching files            26%       28.1%    90.1%     74.1%

   Flagging emails (as
                              36.4%      37.5%    72.5%     63%
   important / junk)

Searching through emails      62.3%      46.9%     89%      77.8%

 Sending SMS messages         98.7%      15.6%    24.2%     18.5%

Receiving SMS messages        96.1%      18.8%    20.9%     11.1%

Saving draft SMS messages     76.6%      15.6%    14.3%     5.6%

    Instant messaging         68.8%      43.8%    69.2%     59.3%

       Voice calls            76.6%      46.9%    59.3%     40.7%

       Video calls            31.2%      50%      65.9%     40.7%
https://evernote.com/evernote/, accessed 11.01.2013
Conclusion
The New Reality
• People use a plethora of different devices
  and services to support their activities.
• Devices can collect and leverage contextual
  information.
• We currently do not have a clear
  understanding how to design for this type
  of interaction.
http://connectingthefilm.com, accessed 14.01.2013
Thank you

More Related Content

What's hot

Parallel computing
Parallel computingParallel computing
Parallel computingVinay Gupta
 
Probabilistic Reasoning
Probabilistic Reasoning Probabilistic Reasoning
Probabilistic Reasoning Sushant Gautam
 
Unit 5.1-Basics of Hierarchical Task Analysis (HTA).pptx
Unit 5.1-Basics of Hierarchical Task Analysis (HTA).pptxUnit 5.1-Basics of Hierarchical Task Analysis (HTA).pptx
Unit 5.1-Basics of Hierarchical Task Analysis (HTA).pptxNeetuBairwa
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architectureMaulik Togadiya
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud ComputingHitesh Mohapatra
 
Comparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesComparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesLemia Algmri
 
hci in software development process
hci in software development processhci in software development process
hci in software development processKainat Ilyas
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Usability Evaluation Considered Harmful (Some of the Time)
Usability Evaluation Considered Harmful (Some of the Time)Usability Evaluation Considered Harmful (Some of the Time)
Usability Evaluation Considered Harmful (Some of the Time)Saul Greenberg
 
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information ArchitectureLifna C.S
 
Foundations of hci the computer
Foundations of hci   the computerFoundations of hci   the computer
Foundations of hci the computerswarna sudha
 

What's hot (20)

Parallel computing
Parallel computingParallel computing
Parallel computing
 
High performance computing
High performance computingHigh performance computing
High performance computing
 
Part Picking Robot
Part Picking RobotPart Picking Robot
Part Picking Robot
 
The computer HCI
The computer HCIThe computer HCI
The computer HCI
 
Probabilistic Reasoning
Probabilistic Reasoning Probabilistic Reasoning
Probabilistic Reasoning
 
Cognitive models unit 3
Cognitive models unit 3Cognitive models unit 3
Cognitive models unit 3
 
Unit 5.1-Basics of Hierarchical Task Analysis (HTA).pptx
Unit 5.1-Basics of Hierarchical Task Analysis (HTA).pptxUnit 5.1-Basics of Hierarchical Task Analysis (HTA).pptx
Unit 5.1-Basics of Hierarchical Task Analysis (HTA).pptx
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
 
Scheduling in Cloud Computing
Scheduling in Cloud ComputingScheduling in Cloud Computing
Scheduling in Cloud Computing
 
Comparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesComparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And Activities
 
Google TPU
Google TPUGoogle TPU
Google TPU
 
hci in software development process
hci in software development processhci in software development process
hci in software development process
 
On demand provisioning
On demand provisioningOn demand provisioning
On demand provisioning
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Unit 4
Unit 4Unit 4
Unit 4
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Uncertainty in AI
Uncertainty in AIUncertainty in AI
Uncertainty in AI
 
Usability Evaluation Considered Harmful (Some of the Time)
Usability Evaluation Considered Harmful (Some of the Time)Usability Evaluation Considered Harmful (Some of the Time)
Usability Evaluation Considered Harmful (Some of the Time)
 
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information Architecture
 
Foundations of hci the computer
Foundations of hci   the computerFoundations of hci   the computer
Foundations of hci the computer
 

Similar to Ubiquitous interactions

Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Daniel Roggen
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignDave Shaw
 
Mobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextMobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextFlorent Stroppa
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middlewarevivatechijri
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstractPriti Punia
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paperEman Kanjo
 
International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)CSCJournals
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0jan aljan
 
Resource sharing in ubiquitous environment
Resource sharing in ubiquitous environmentResource sharing in ubiquitous environment
Resource sharing in ubiquitous environmentMuhammad Hussain
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingValeria Gasik
 

Similar to Ubiquitous interactions (20)

Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?Wearable Computing - Part I: What is Wearable Computing?
Wearable Computing - Part I: What is Wearable Computing?
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Mobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile contextMobile user experience conference 2009 - The rise of the mobile context
Mobile user experience conference 2009 - The rise of the mobile context
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & MiddlewareUBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
UBIQUITOUS COMPUTING Its Paradigm, Systems & Middleware
 
HGR-thesis
HGR-thesisHGR-thesis
HGR-thesis
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Mobsens -Journal paper
Mobsens -Journal paperMobsens -Journal paper
Mobsens -Journal paper
 
50120140502006
5012014050200650120140502006
50120140502006
 
Smart Built-Environments for People Living with Dementia_Crimson Publishers
Smart Built-Environments for People Living with Dementia_Crimson PublishersSmart Built-Environments for People Living with Dementia_Crimson Publishers
Smart Built-Environments for People Living with Dementia_Crimson Publishers
 
International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)International Journal of Computer Science and Security Volume (2) Issue (3)
International Journal of Computer Science and Security Volume (2) Issue (3)
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
 
Resource sharing in ubiquitous environment
Resource sharing in ubiquitous environmentResource sharing in ubiquitous environment
Resource sharing in ubiquitous environment
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 

More from InteractionDesign

Testing Paper Prototypes (IxDworks)
Testing Paper Prototypes (IxDworks)Testing Paper Prototypes (IxDworks)
Testing Paper Prototypes (IxDworks)InteractionDesign
 
HCI Studies (Tallinn University Institute of Informatics)
HCI Studies (Tallinn University Institute of Informatics)HCI Studies (Tallinn University Institute of Informatics)
HCI Studies (Tallinn University Institute of Informatics)InteractionDesign
 
IxDworks mini-workshop: Testing Paper Prototyping
IxDworks mini-workshop: Testing Paper PrototypingIxDworks mini-workshop: Testing Paper Prototyping
IxDworks mini-workshop: Testing Paper PrototypingInteractionDesign
 
IxDworks mini-workshop: Paper Prototyping
IxDworks mini-workshop: Paper PrototypingIxDworks mini-workshop: Paper Prototyping
IxDworks mini-workshop: Paper PrototypingInteractionDesign
 
IxD Works Miniworkshop: Introduction
IxD Works Miniworkshop: IntroductionIxD Works Miniworkshop: Introduction
IxD Works Miniworkshop: IntroductionInteractionDesign
 
Approaches to Interaction Design
Approaches to Interaction DesignApproaches to Interaction Design
Approaches to Interaction DesignInteractionDesign
 
Personas, scenarios, user stories
Personas, scenarios, user storiesPersonas, scenarios, user stories
Personas, scenarios, user storiesInteractionDesign
 
IT trends for 2014 - IxDworks.com
IT trends for 2014 - IxDworks.comIT trends for 2014 - IxDworks.com
IT trends for 2014 - IxDworks.comInteractionDesign
 
Near Field Communication – IxDworks.com
Near Field Communication – IxDworks.comNear Field Communication – IxDworks.com
Near Field Communication – IxDworks.comInteractionDesign
 
Building medium-fidelity prototypes - IxDWorks.com
Building medium-fidelity prototypes - IxDWorks.comBuilding medium-fidelity prototypes - IxDWorks.com
Building medium-fidelity prototypes - IxDWorks.comInteractionDesign
 
Personas, scenarios, user stories
Personas, scenarios, user storiesPersonas, scenarios, user stories
Personas, scenarios, user storiesInteractionDesign
 

More from InteractionDesign (17)

Testing Paper Prototypes (IxDworks)
Testing Paper Prototypes (IxDworks)Testing Paper Prototypes (IxDworks)
Testing Paper Prototypes (IxDworks)
 
HCI Studies (Tallinn University Institute of Informatics)
HCI Studies (Tallinn University Institute of Informatics)HCI Studies (Tallinn University Institute of Informatics)
HCI Studies (Tallinn University Institute of Informatics)
 
IxDworks mini-workshop: Testing Paper Prototyping
IxDworks mini-workshop: Testing Paper PrototypingIxDworks mini-workshop: Testing Paper Prototyping
IxDworks mini-workshop: Testing Paper Prototyping
 
IxDworks mini-workshop: Paper Prototyping
IxDworks mini-workshop: Paper PrototypingIxDworks mini-workshop: Paper Prototyping
IxDworks mini-workshop: Paper Prototyping
 
IxD Works Miniworkshop: Introduction
IxD Works Miniworkshop: IntroductionIxD Works Miniworkshop: Introduction
IxD Works Miniworkshop: Introduction
 
Paper Prototyping
Paper PrototypingPaper Prototyping
Paper Prototyping
 
Approaches to Interaction Design
Approaches to Interaction DesignApproaches to Interaction Design
Approaches to Interaction Design
 
6 Thinking Hats
6 Thinking Hats6 Thinking Hats
6 Thinking Hats
 
Personas, scenarios, user stories
Personas, scenarios, user storiesPersonas, scenarios, user stories
Personas, scenarios, user stories
 
ICWL / Introduction
ICWL / IntroductionICWL / Introduction
ICWL / Introduction
 
IT trends for 2014 - IxDworks.com
IT trends for 2014 - IxDworks.comIT trends for 2014 - IxDworks.com
IT trends for 2014 - IxDworks.com
 
Near Field Communication – IxDworks.com
Near Field Communication – IxDworks.comNear Field Communication – IxDworks.com
Near Field Communication – IxDworks.com
 
Building medium-fidelity prototypes - IxDWorks.com
Building medium-fidelity prototypes - IxDWorks.comBuilding medium-fidelity prototypes - IxDWorks.com
Building medium-fidelity prototypes - IxDWorks.com
 
Lo fi prototyping
Lo fi prototypingLo fi prototyping
Lo fi prototyping
 
Personas, scenarios, user stories
Personas, scenarios, user storiesPersonas, scenarios, user stories
Personas, scenarios, user stories
 
Responsive design
Responsive designResponsive design
Responsive design
 
Fundamentals of new media
Fundamentals of new mediaFundamentals of new media
Fundamentals of new media
 

Ubiquitous interactions

  • 1. Ubiquitous Interactions Ilya Shmorgun
  • 4. New Types of Interaction • Our activities are supported by a wide range of devices and software. • Our devices are capable of sensing the context of our activities. • Our devices and services are still being designed in isolation.
  • 5. Camera GPS and GLONASS Ambient light sensor Proximity sensor Accelerometer Three-axis gyroscope Digital compass WiFi 3G and EDGE Bluetooth http://www.apple.com/iphone/specs.html, accessed 28.11.2012
  • 7. Post-Desktop Model of HCI • Information processing is integrated into everyday objects [1]. • Ubiquitous computing is subsuming traditional computing paradigms, for example desktop and mobile computing [2]. 1. Zhao, R., Wang, J.:Visualizing the research on pervasive and ubiquitous computing. Scientometrics 86(3), 593–612 (2011) 2. Greenfield, A.: Everyware: The Dawning Age of Ubiquitous Computing. New Riders Publishing, 1st edn. (Mar 2006)
  • 8. Invisible Computing • Interaction with computers should be more like interaction with the physical world [1]. • Users should be able to sense and control what directly interests them [2]. • Our devices remain the focus of attention instead of fading into the background. 1. Abowd, G., Mynatt, E.: Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human Interaction (TOCHI) 7(1), 29–58 (2000) 2. Roussos, G., Musolesi, M., Magoulas, G.D.: Human behavior in ubiquitous environments: Experience and interaction design. Pervasive and Mobile Computing 6(5), 497–498 (Oct 2010)
  • 10. People and Computers • Previously a ”one-to-one” relationship, one technology - one application - one user. • Nowadays “many-to-many”, with ever- changing configurations of devices, applications, and users. Brodersen, C., Bødker, S., Klokmose, C.: Ubiquitous substitution. Human-Computer Interaction–INTERACT 2007 pp. 179–192 (2007)
  • 12. Context • Any information, which characterizes the situation of a person, a place or an object, relevant to the interaction between a user and an application [1]. • Ubiquitous computing as ”a technology of context” [2]. 1. Chen, G., Kotz, D.: A survey of context-aware mobile computing research (2000) 2. Dourish,P.: Where the Action Is: The Foundations of Embodied Interaction (Bradford Books). The MIT Press, new ed edn. (Aug 2004)
  • 13. Types of Context • Where you are. • Who you are with. • What resources are nearby. Schilit, B., Adams, N., Want, R.: Context-aware computing applications (1994)
  • 14. wn apps Unsatisfactory state Stable state seen as ? Artifact ‘how’ pending ng that reading s men- deeper ble dy- Excited state Figure 2. The states of the artifact ecology. In the unsatisfactory gies are state the current artifact ecology no longer lives up to the users sms of S., Klokmose, C.N.: Dynamics in artifact ecologies (2012) Bødker,
  • 16. Definition Interactions in the context of ubiquitous computing, which include multiple, dynamic, and distributed interfaces. Klokmose, C.N.: An Instrumental Paradigm for Ubiquitous Interaction. DHRS 2006 p. 33 (2006)
  • 18. Properties • Occurring all the time • Occurring everywhere • Occurring on any device with ease of substituting devices when necessary • Being transparent • Being informed by context
  • 19. Properties • Occurring all the time • Occurring everywhere • Occurring on any device with ease of substituting devices when necessary • Being transparent • Being informed by context
  • 20. Properties • Occurring all the time • Occurring everywhere • Occurring on any device with ease of substituting devices when necessary • Being transparent • Being informed by context
  • 21. Smartphone Tablet Laptop Desktop Communication 96.1% 96.9% 94.5% 94.4% tools Social networking 90.9% 84.4% 87.9% 90.7% Office applications 84.4% 90.6% 85.7% 85.2% File sharing 71.4% 68.8% 65.9% 70.4% Calendars 62.3% 68.8% 54.9% 61.1% Reading 51.9% 62.5% 47.3% 48.1% Blogging 48.1% 46.9% 42.9% 40.7% Note-taking 48.1% 43.8% 42.9% 44.4% Task management 40.3% 46.9% 37.4% 37%
  • 24. Smartphone Tablet Laptop Desktop Reading emails 96.1% 62.5% 96.7% 87% Answering / composing 76.6% 56.3% 93.4% 79.6% emails Saving draft emails 46.8% 43.8% 84.6% 72.2% Attaching files 26% 28.1% 90.1% 74.1% Flagging emails (as 36.4% 37.5% 72.5% 63% important / junk) Searching through emails 62.3% 46.9% 89% 77.8% Sending SMS messages 98.7% 15.6% 24.2% 18.5% Receiving SMS messages 96.1% 18.8% 20.9% 11.1% Saving draft SMS messages 76.6% 15.6% 14.3% 5.6% Instant messaging 68.8% 43.8% 69.2% 59.3% Voice calls 76.6% 46.9% 59.3% 40.7% Video calls 31.2% 50% 65.9% 40.7%
  • 27. The New Reality • People use a plethora of different devices and services to support their activities. • Devices can collect and leverage contextual information. • We currently do not have a clear understanding how to design for this type of interaction.