SlideShare a Scribd company logo
1 of 17
Download to read offline
CEWIT 2013
Visual Computing – Voice Driven Computing User Interface Design
Intelligent Product Solutions

WHO ARE WE?

UNRELENTING DEDICATION
TO GREAT PRODUCT DESIGN.

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

THOUGHT THROUGH.
REALLY.

JUST STRAIGHT TALK.
Wearable Computing Market Trends
“ABI  Research forecasts the wearable computing device market will grow to 485 million annual device shipments by 2018.”  
(ABIresearch, 2013)
“According  to IMS Research, the wearables market is poised to grow from 14 million devices shipped in 2011 to as many as
171 million units shipped by 2016.”  (Ballve, 2013)

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Evolution of Head Mounted Computers

1980’s

Present

Motorola HC1

Vuzix Smart Glasses M100
IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Evolution of Voice Driven Applications
• Automobiles

• Phone functions
• GPS navigation
• Media controls
• Radio controls
• General purpose computing for those in need
• Example: Voice activated GPS systems for the blind
• Smart phones
• Siri
• Google Voice

• Wearable computers
• Replaces mouse and keyboard

• Televisions?
• Replaces clunky remote

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Two Major Challenges w/ Speech Enabled UI
1. What are the features and are they obvious??

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

2. Phrasing
Voice Enabled UI on a Head Mounted Computer - Challenges
•
•
•
•
•
•
•
•

Speech recognition engine personality
Environmental issues (Noise)
Varying accents
Processing different vocabulary
Visual cues to commands – “What  do  I  say?”
Application layout & UI
Voice optimized application workflow
Security

“Item  7”  
“View  Library”

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Item  2”
SR Personality, Environmental (Noise), Accents, & Vocabulary

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Visual Cues – “What  Do  I  Say”?
1. Speech icon

2. Global Commands
•
•
•
•
•
•
•

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Main  Menu”
“View  Library”
“Get  Message”
“Camera  Feed”
“Request  Expert”
“Logout”
“Quit  Application”

3.  “My  Computer  Help
Application Layout & UI Design Methods – UX Storyboarding

Storyboards
Storyboardsare
used to consider
are used to
the system from
consider the
a human system from a
centered
human - point of
view.
centered
point of view.

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Application Layout & UI Design Methods – UX Workflows

CAMERA

Workflows
are used to
fully think
the UI
experience
through

LIBRARY

LOG IN

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

EXPERT
SESSION
Application Layout & UI Design Methods – UX Behavioral & Flow

The user
The user
experience is is
experience
carefully
carefully
considered by by
considered
creating specific
creating
detailed use
specific
cases for real
detailed use
user goals. real
cases for
user goals.

Library: Levels 1-4

Search by Voice

Main Menu

“Alpha,  Chapter…”
Final Selection
“View Document”
Content Specific

“Item  3,  Item  7,      
Item  5,  Item  3…”

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“View  Document”
Application Layout & UI Design Methods – UX System Logic: Speech Recognition

Session workflow
from the HC1
perspective.

Start
Program

Verify
connectivity
to server

Connection
successful

Pick
machine to
view

“Quit  
application”

View
Media

Log in to
server

Online &
waiting for
“View   command
Library”

“Item  X”

“Request  Expert”
Wait for
expert to
connect

Expert
voice
connect

View
Document

“Take  
snapshot”

“Camera  
feed”

“Video  
record”

Snapshot
Saved

Real Time
Session
Expert Active

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

“Log  out”

Video
Recording

Video
Streaming

Viewing
Camera

Camera Active
Security

Creating a
method to
log into the
system
with voice
as your
only input

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.
Maturing The UI Over Time

ORIGINAL

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

INTERMIDIATE

FINAL
Developing A Model That Spans Across Industries & Markets
MANUFACTURING

UTILITIES

ABC COMPANY
Category A (3)
Category A (3)

Category G (5)

Category B (2)
Category B (2)

Category H (11)

Category C (5)
Category C (5)

Category I (3)

Category D (13)
Category D (13)

Category J (6)

Category E (1)
Category E (1)

Category K (8)

Category F (22)
Category F (22)

Category L (16)

MILITARY MRO

EMERGENCY MEDICINE

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

VEHICLE REPAIR

HOSPITAL
References
ABIresearch (2013).  “Wearable  Computing  Devices,  Like  Apple’s  iWatch,  W ill  Exceed  485  Million  Annual  Shipments  by  2018.”  Online.  Available:  
https://www.abiresearch.com/press/wearable-computing-devices-like-apples-iwatch-will
Ballve,  M.  (2013).  “WEARABLE  COMPUTING:  Inside  The  New  Mobile  Market  That  Is  Taking  Shape.”  Online.  Available:
http://www.businessinsider.com/wearables-create-new-mobile-markets-2013-9

IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS.
Disclosure of the information contained herein to any third party is strictly prohibited.

More Related Content

What's hot

Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Amazon Web Services
 

What's hot (20)

Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011Andrew Jaquith SOURCE Boston 2011
Andrew Jaquith SOURCE Boston 2011
 
FST Biometrics Corporate Presentation
FST Biometrics Corporate PresentationFST Biometrics Corporate Presentation
FST Biometrics Corporate Presentation
 
CNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device ManagementCNIT 128 7: Mobile Device Management
CNIT 128 7: Mobile Device Management
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
An Example of Speech Processing Program – Siri
An Example of Speech Processing Program – SiriAn Example of Speech Processing Program – Siri
An Example of Speech Processing Program – Siri
 
Enterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema GhanekarEnterprise Mobility as a Service using AWS - Seema Ghanekar
Enterprise Mobility as a Service using AWS - Seema Ghanekar
 
How Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - InfographicHow Intel Security Ensures Identity Protection - Infographic
How Intel Security Ensures Identity Protection - Infographic
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
Java Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-EnterpriseJava Solutions for Securing Edge-to-Enterprise
Java Solutions for Securing Edge-to-Enterprise
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting SeriousThe Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
 
CNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile paymentsCNIT 128: 9: Mobile payments
CNIT 128: 9: Mobile payments
 
Creating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdkCreating secure apps using the salesforce mobile sdk
Creating secure apps using the salesforce mobile sdk
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 

Viewers also liked

EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016
Michael Mendelson
 
From Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsFrom Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious Tags
Stefano Bussolon
 
How Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionHow Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer Interaction
Marco Silva
 

Viewers also liked (20)

Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 
Understanding Voice User Interface Design
Understanding Voice User Interface DesignUnderstanding Voice User Interface Design
Understanding Voice User Interface Design
 
Use Cases for Voice User Interface
Use Cases for Voice User InterfaceUse Cases for Voice User Interface
Use Cases for Voice User Interface
 
Conversational apps UX best practices
Conversational apps UX best practicesConversational apps UX best practices
Conversational apps UX best practices
 
(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood(MBL310) Alexa Voice Service Under the Hood
(MBL310) Alexa Voice Service Under the Hood
 
The Human Interface
The Human InterfaceThe Human Interface
The Human Interface
 
EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016EI-driven VUI design MENDELSON PTP SpeechTek2016
EI-driven VUI design MENDELSON PTP SpeechTek2016
 
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
Evangelizing and Designing Voice User Interface: Adopting VUI in a GUI world
 
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoiceAnwendungsfälle für Sprachanwendungen - FutureOfVoice
Anwendungsfälle für Sprachanwendungen - FutureOfVoice
 
User Interface
User InterfaceUser Interface
User Interface
 
Voice Design Coaching programa Voice Design Branding
Voice Design Coaching   programa Voice Design BrandingVoice Design Coaching   programa Voice Design Branding
Voice Design Coaching programa Voice Design Branding
 
Touch first and touch free designs
Touch first and touch free designsTouch first and touch free designs
Touch first and touch free designs
 
Natural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using KinectNatural User Interface Demo based on - 3D Brick Game using Kinect
Natural User Interface Demo based on - 3D Brick Game using Kinect
 
From Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious TagsFrom Clouds to Trees: Clustering Delicious Tags
From Clouds to Trees: Clustering Delicious Tags
 
Bussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhereBussolon, Betti: Conceptualize once, design anywhere
Bussolon, Betti: Conceptualize once, design anywhere
 
Designing Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave IsbitskiDesigning Voice-Driven Game Experiences | Dave Isbitski
Designing Voice-Driven Game Experiences | Dave Isbitski
 
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
NUI - Natural User Interfaces: nur ein Hype oder die nächste Stufe der Intera...
 
How Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer InteractionHow Natural User Interfaces are changing Human Computer Interaction
How Natural User Interfaces are changing Human Computer Interaction
 
The X factor - defining the concept of Experience
The X factor - defining the concept of ExperienceThe X factor - defining the concept of Experience
The X factor - defining the concept of Experience
 
Ride the Wave of Conversational UX
Ride the Wave of Conversational UXRide the Wave of Conversational UX
Ride the Wave of Conversational UX
 

Similar to Voice Driven User Interface Design

2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
Thorsten Schroeer
 

Similar to Voice Driven User Interface Design (20)

Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
Gianni Rosa Gallina - Where and how can AI be used in a real-world multimedia...
 
Cognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz SaračevićCognitive Digital Twin by Fariz Saračević
Cognitive Digital Twin by Fariz Saračević
 
AI in the Enterprise
AI in the EnterpriseAI in the Enterprise
AI in the Enterprise
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim HuckabyEmerging Experiences - More Personal Computing (MPC) - Tim Huckaby
Emerging Experiences - More Personal Computing (MPC) - Tim Huckaby
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
2106-04-30 - IBM - The Era of the Cognitive Home - for distribution
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
20160813 102-59-kim youngwook
20160813 102-59-kim youngwook20160813 102-59-kim youngwook
20160813 102-59-kim youngwook
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
 
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & CloudantBuild Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
Build Scalable Internet of Things Apps using Cloud Foundry, Bluemix & Cloudant
 
Gartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouchGartner Catalyst 2015 Customer Presentation - MindTouch
Gartner Catalyst 2015 Customer Presentation - MindTouch
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Voice Driven User Interface Design

  • 1. CEWIT 2013 Visual Computing – Voice Driven Computing User Interface Design
  • 2. Intelligent Product Solutions WHO ARE WE? UNRELENTING DEDICATION TO GREAT PRODUCT DESIGN. IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. THOUGHT THROUGH. REALLY. JUST STRAIGHT TALK.
  • 3. Wearable Computing Market Trends “ABI  Research forecasts the wearable computing device market will grow to 485 million annual device shipments by 2018.”   (ABIresearch, 2013) “According  to IMS Research, the wearables market is poised to grow from 14 million devices shipped in 2011 to as many as 171 million units shipped by 2016.”  (Ballve, 2013) IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 4. Evolution of Head Mounted Computers 1980’s Present Motorola HC1 Vuzix Smart Glasses M100 IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 5. Evolution of Voice Driven Applications • Automobiles • Phone functions • GPS navigation • Media controls • Radio controls • General purpose computing for those in need • Example: Voice activated GPS systems for the blind • Smart phones • Siri • Google Voice • Wearable computers • Replaces mouse and keyboard • Televisions? • Replaces clunky remote IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 6. Two Major Challenges w/ Speech Enabled UI 1. What are the features and are they obvious?? IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. 2. Phrasing
  • 7. Voice Enabled UI on a Head Mounted Computer - Challenges • • • • • • • • Speech recognition engine personality Environmental issues (Noise) Varying accents Processing different vocabulary Visual cues to commands – “What  do  I  say?” Application layout & UI Voice optimized application workflow Security “Item  7”   “View  Library” IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Item  2”
  • 8. SR Personality, Environmental (Noise), Accents, & Vocabulary IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 9. Visual Cues – “What  Do  I  Say”? 1. Speech icon 2. Global Commands • • • • • • • IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Main  Menu” “View  Library” “Get  Message” “Camera  Feed” “Request  Expert” “Logout” “Quit  Application” 3.  “My  Computer  Help
  • 10. Application Layout & UI Design Methods – UX Storyboarding Storyboards Storyboardsare used to consider are used to the system from consider the a human system from a centered human - point of view. centered point of view. IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 11. Application Layout & UI Design Methods – UX Workflows CAMERA Workflows are used to fully think the UI experience through LIBRARY LOG IN IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. EXPERT SESSION
  • 12. Application Layout & UI Design Methods – UX Behavioral & Flow The user The user experience is is experience carefully carefully considered by by considered creating specific creating detailed use specific cases for real detailed use user goals. real cases for user goals. Library: Levels 1-4 Search by Voice Main Menu “Alpha,  Chapter…” Final Selection “View Document” Content Specific “Item  3,  Item  7,       Item  5,  Item  3…” IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “View  Document”
  • 13. Application Layout & UI Design Methods – UX System Logic: Speech Recognition Session workflow from the HC1 perspective. Start Program Verify connectivity to server Connection successful Pick machine to view “Quit   application” View Media Log in to server Online & waiting for “View   command Library” “Item  X” “Request  Expert” Wait for expert to connect Expert voice connect View Document “Take   snapshot” “Camera   feed” “Video   record” Snapshot Saved Real Time Session Expert Active IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. “Log  out” Video Recording Video Streaming Viewing Camera Camera Active
  • 14. Security Creating a method to log into the system with voice as your only input IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.
  • 15. Maturing The UI Over Time ORIGINAL IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. INTERMIDIATE FINAL
  • 16. Developing A Model That Spans Across Industries & Markets MANUFACTURING UTILITIES ABC COMPANY Category A (3) Category A (3) Category G (5) Category B (2) Category B (2) Category H (11) Category C (5) Category C (5) Category I (3) Category D (13) Category D (13) Category J (6) Category E (1) Category E (1) Category K (8) Category F (22) Category F (22) Category L (16) MILITARY MRO EMERGENCY MEDICINE IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited. VEHICLE REPAIR HOSPITAL
  • 17. References ABIresearch (2013).  “Wearable  Computing  Devices,  Like  Apple’s  iWatch,  W ill  Exceed  485  Million  Annual  Shipments  by  2018.”  Online.  Available:   https://www.abiresearch.com/press/wearable-computing-devices-like-apples-iwatch-will Ballve,  M.  (2013).  “WEARABLE  COMPUTING:  Inside  The  New  Mobile  Market  That  Is  Taking  Shape.”  Online.  Available: http://www.businessinsider.com/wearables-create-new-mobile-markets-2013-9 IPS Company Confidential- Contains confidential and proprietary intellectual property of IPS. Disclosure of the information contained herein to any third party is strictly prohibited.