Skip to main content

Sony Xperia Eye could thrust AI-based ‘lifelogging’ into the limelight

Before diving in the Xperia Eye, let’s take a quick survey of the lifelogging genre to throw into better relief the advantages Sony is hoping to bring to the table. Lifelogging, for those new to the concept, is the process of using technology to track personal data generated by our own behavioral activities. In its most ubiquitous form, lifelogging consists of recording health and fitness metrics. This is part of what’s been termed the quantified self-movement, the bulwark of which is formed by many popular smartphone apps such as Health Tracker and Under Armour Record. Lifelogging cameras take this a step further, adding a visual record to the layer cake of data that represents one’s unfolding life experience.Lifelogging cameras, despite having been floating around in various R&D labs for well over a decade and inspiring many a strange and wonderful science fiction tale, have categorically failed to take hold in the mainstream. Now Sony is stepping up to the plate to have another crack at this concept with the Xperia Eye.
Xperia Eye
Lifelogging cameras have been touted on the basis of capturing important visual moments that one would otherwise miss if only possessed of a conventional camera, such as the gleeful exclamation spilling from a child when they glimpse a surprise birthday cake. And this is where Sony thinks they might have arrived at a means of improving upon the previous offerings. Rather than generate terabytes of superfluous photos and video footage, they have equipped their camera with forms of AI such as face recognition and voice detection, such that it selectively records the moments most likely to be significant to the individual. We have reported on similar developments before involving scene recognition by artificial intelligence, and it’s likely that Sony is using similar technology in their Xperia Eye.
Despite these kind of software breakthroughs, the Xperia Eye will still have to contend with a host of problems, the most significant being the lack of a really compelling use case. For most users, the inconvenience of wearing a camera 24/7 outweighs the benefits of capturing that one interesting photo or phrase that might occur during the course of a day. Rather than fancy voice-recognizing AI, Sony may be better served by taking a page from science fiction to promote the use of their device. In The Final Cut, a 2004 sci-fi thriller, Robin Williams plays a man who is responsible for curating video montages taken from a lifelogging device and forming a highlight reel of one’s life. Given the millennial generation’s penchant for selfies, a fast and easy method for both creating and sharing such a highlight reel might be the magic bullet necessary to take a device like Xperia Eye to prime time.
But science fiction also warns of a dark side to lifelogging and one we should probably heed before going gaga over video selfies. I will call this the Too Much Truth Dilemma, and it’s most clearly spelled out in an episode from Black Mirror, in which a husband and wife see the fabric of their lives gradually unravel thanks to the small disturbing truths they learn about each other from their lifelogging devices.
It turns out nature has already equipped us with a kind of lifelogging device in the form of our long and short term memories, which are in most cases curated to help us remain stable and happy individuals. Start examining our experiences in too much detail through the unapologetic lens of the lifelogging camera, and we may find that the truth is a poor substitute for fiction.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…