Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking

Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ in the human body. While the first, second, and third screens have historically exercised the potential of this organ to digest output information, the fourth (wearables) presents an attractive first foray for sight as an input.

Wrist-based, head-worn, and other wearable devices all benefit from the strengths of their predecessors by building on the familiarity of tap, touch, and talk-based interactions. The challenge is that smaller screens compromise the capacity to communicate and consume information, and, up until recently, there were few commercially-available alternatives to bridge this gap.

Market Players

While eye-tracking technologies represent a nascent market, a number of players have already started to enter the space, bringing an array of new solutions to enhance the glanceable, intuitive, and more immersive experiences that the fourth screens are designed to deliver.

Companies such as CA-based startup Eyefluence, which was acquired by Google in 4Q 2016, and The Eye Tribe, which was just acquired by Oculus (Facebook), are on an ambitious, yet attainable, quest to capitalize on this notion by bringing eye-tracking technologies to wearable AR/VR devices. With eye tracking, the idea is to use vision as a vehicle to measure intent. The long-term outlook is for this kind of functionality to complement, rather than compete with, various components that make more spatially-aware, contextual computing solutions an IoT reality.

To compete in this market, it is important to understand how best to leverage the Optimal Recognition Point (ORP), or the point within a word to which a reader’s eyes naturally gravitate before the brain starts to process its meaning, using these new technologies.

When reading traditionally formatted, line-by-line text, the eye jumps from one word to the next, identifying each ORP along the way until a punctuation mark signals the brain to pause and make sense of it all. This is one of the reasons why it’s hard to recite the alphabet or a song backwards; the components that make them whole are learned in sequence.

Positional Memory Matters

When working with sequential data—which is often the case in IoT—positional memory matters.

Regular neural nets are generally oriented around fixed-size inputs and outputs based on the unidirectional flow of input data in the hidden layer (e.g., a feedforward neural network). Recurrent neural nets (RNNs) incorporate the concept of memory. To do this, a combination of input data and hidden-layer information from each timestep is used as an input for the previous timestep, recursively. It’s this hidden recurrence that adds both the context and the back-end framework that advanced analytics and Machine Learning rely on, spanning everything from handwriting and image recognition to speech and natural language processing (NLP).

The same overarching methodology is gaining attention from companies like Google, via its 2014 acquisition of DeepMind, as the company’s AI-inspired Garage projects make their way into medical, industrial, and retail operations, among others. This methodology will also be crucial for emerging eye-tracking technology solutions to get on the radar.

In the interim, gesture control will serve as the stepping stone for the forthcoming ubiquity of eye-tracking technologies, particularly as they permeate the broader IoT landscape. The fundamental difference is simple: gestures are based on existing hardware but require the user to learn, initiate, and engage with the device for the interaction to occur; eye-tracking technologies allow the user to achieve the same ends as gesture technologies by creating value from something they already do… look.

By Ryan Martin, Senior Analyst at ABI Research

Jim Fagan
Subsea Connectivity Digital transformation and the migration of data and applications to the cloud is a global phenomenon. While we may like to think that the cloud knows no borders, the reality is that geopolitics ...
Stacey Farrar
Document Migrations Require More Diligence Data creation has risen dramatically in recent years and shows no signs of slowing. According to analyst firm IDC, widespread remote work led to a spike of new data in ...
David Loo
The Long-term Costs of Data Debt It’s no secret that many of today’s enterprises are experiencing an extreme state of data overload. With the rapid adoption of new technologies to accommodate pandemic-induced shifts like remote ...
Alex Vakulov
Ransomware Database Targeting The scourge of ransomware is undoubtedly the most severe cyber security concern for home users and organizations these days. It revolves around taking important data hostage and demanding money, usually hard-to-trace cryptocurrency ...
Jonathan Custance
IoT –  Part of Your Essential Kit Jonathan Custance, Co-Founder of Green Custard outlines how industrial organisations can leverage IoT to dramatically reduce their carbon footprint  Technological progress and environmental sustainability have always been at ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.