Episodes
This is a reading of Cecchinato et al.'s short paper "Smartwatches: the good, the bad and the ugly?" The full text of this paper is available at: https://doi.org/10.1145/2702613.2732837
Published 04/25/21
This week we are introducing the concept of wearable computing. We will cover some of the challenges of developing wearables from technical and non-technical perspective. We'll also talk a little about 'Wear OS by Google' (which is Google's rebranded 'Android Wear'). Smartwatches in particular were predicted to have had an explosion in use; they've not disappeared by any means, but they've not become the next 'must have' that everyone keeps with them all the time. Why is this? 
Published 04/25/21
This is a reading of Chan et al.'s excellent paper on microgesture elicitation. You can access a PDF of the reading from Canvas or from the ACM.
Published 04/15/21
Back in Week 2 we talked about the challenges of interaction in mobile and ubiquitous computing contexts. And this week we're coming back to it in a different way – gestures. Gestures are often thought of as being a natural part of communication. Could they be a good fit for contexts were a keyboard and mouse is not really appropriate? This week we'll be covering some of the conceptual aspects surrounding gesture-based computing as well as some of the technical challenges involved.
Published 04/15/21
This is a reading of John Krumm's "A survey of computational location privacy" paper from Personal and Ubiquitous Computing. It's quite old now, but I think it still gives a really good introduction to privacy concerns surround location-based services and reviews a variety of computational techniques for reducing the chances of data leakage. Full paper: https://link.springer.com/content/pdf/10.1007/s00779-008-0212-5.pdf
Published 03/19/21
One of the biggest and most important topics in mobile and ubiquitous computing is privacy and security. Having lots of devices transmitting huge amounts of telemetry all over the world comes with a number of privacy and security challenges. We'll start off by considering a 'local' or on-person threat to privacy in the form of RFID cards. Then we'll cover a little on cloud-based computing and the privacy and security challenges there. We'll finish by thinking about user perspectives on...
Published 03/19/21
By Cecchinato, Gould and Pitts. This article is about telemtry-based workplace tracking and its implications for the wellbeing of workers. It reviews previous literature from sociological and HCI traditions and ends with thoughts on how workers might be able to collectively bargain over data collection in a way that evens the power imbalance common in workplace 'bossware'.
Published 03/12/21
By Ferreira, Kostakos and Dey, this paper introduces the AWARE framework for building context-aware systems and conducting in situ sensor-based research. 
Published 03/12/21
This week we're focusing on telemetry. Telemetry is a really critical part of ubiquitous computing systems; it's the label for how we collect, transport and store data collected both through sensors and from people. Telemetry supports context building, which can improve the awareness of particular applications. But there are limitations to telemetry too – we have to make sure that what we can measure is a reliable proxy for what we want to understand. We also have to be attuned to the massive...
Published 03/12/21
This is a classic contribution by Steve Benford and colleagues. The article is about the deployment of a complex location-based game platform. The focus of this paper is specifically on the breakdowns experienced by players and how this influenced playing styles and perspectives on the game. It is critical for us because it is a demonstration of the idea of seamfulness; sometimes you can't fix all the issues and you need to instead focus on designing around them.
Published 02/26/21
This week we're going to be covering one of the most salient aspects of context-aware computing: location. We're going to start off by discussing existing location-sensing technologies, such as GPS (and related services) as well as less well-known technologies from the history of ubiquitous computing. We're also going to cover aspects of Android location sensing and privacy and security implications of location-sensing technologies.
Published 02/26/21
This is a reading of Fisher et al.'s oft-cited paper on the timing and workload of mobile notifications. The full paper is available in the ACM Digital Library: https://dl.acm.org/doi/abs/10.1145/2037373.2037402
Published 02/19/21
We get lots of notifications on our mobile devices from all kinds of services. Sometimes we suffer from 'notification overload'. Why do notifications disrupt us in this way? In this podcast we'll be learning how psychological theory can help us to understand the sources of notification overload. We'll also discuss how notifications can be made more user friendly, whether through smart management systems or careful design.
Published 02/19/21
In this podcast I read Anind Dey's 'Context-aware Computing' chapter from John Krumm's Ubiquitous Computing Fundamentals. Although this reading is quite long (over an hour), Dey provides a lot of detail on the history of context-aware computing as well as discussing practical aspects of developing context-aware systems.
Published 02/12/21
This week we're covering two slightly separate topics. First, we will cover context-awareness in ubiquitous computing. Context-awareness is a tricky thing to define, but we're still going to think about the kinds of properties a context aware system should have. In the second part of this podcast we're going to be focusing on web-based APIs and why we use them. We'll cover REST, Webhooks and API-First design along the way.
Published 02/12/21
This is a reading of Wiseman et al.'s "User Your Words" paper, published at CHI 2016. The paper can be viewed in the ACM Digital Library: https://dl.acm.org/doi/10.1145/2858036.2858377 The paper is about developing pairing codes for digital radios. Numeric, alphanumeric and word-based codes are considered and tested in an experiment.
Published 02/05/21
This week we're going to be thinking about how we can interact with ubiquitous computing technologies. This includes typing on touchscreens (and very small screens), pairing devices and interacting with devices without traditional user interfaces. 
Published 02/05/21
In this episode I read Mark Weiser's extremely influential Scientific American article, "The Computer for the 21st Century".
Published 01/27/21
This week I introduce the module. We start off with a short history of the evolution of computing over the decades. Next, you'll hear about how mobile phones have become the dominant ubiquitous computing technology. The main part of the podcast finishes by introducing some of the kinds of 'ubicomp' research that we're going to touch on throughout the module. As this podcast will, hopefully, get you moving, I thought it'd be good to finish the episode by talking to Prof Anna Cox from the UCL...
Published 01/27/21