Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking

Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ in the human body. While the first, second, and third screens have historically exercised the potential of this organ to digest output information, the fourth (wearables) presents an attractive first foray for sight as an input.

Wrist-based, head-worn, and other wearable devices all benefit from the strengths of their predecessors by building on the familiarity of tap, touch, and talk-based interactions. The challenge is that smaller screens compromise the capacity to communicate and consume information, and, up until recently, there were few commercially-available alternatives to bridge this gap.

Market Players

While eye-tracking technologies represent a nascent market, a number of players have already started to enter the space, bringing an array of new solutions to enhance the glanceable, intuitive, and more immersive experiences that the fourth screens are designed to deliver.

Companies such as CA-based startup Eyefluence, which was acquired by Google in 4Q 2016, and The Eye Tribe, which was just acquired by Oculus (Facebook), are on an ambitious, yet attainable, quest to capitalize on this notion by bringing eye-tracking technologies to wearable AR/VR devices. With eye tracking, the idea is to use vision as a vehicle to measure intent. The long-term outlook is for this kind of functionality to complement, rather than compete with, various components that make more spatially-aware, contextual computing solutions an IoT reality.

To compete in this market, it is important to understand how best to leverage the Optimal Recognition Point (ORP), or the point within a word to which a reader’s eyes naturally gravitate before the brain starts to process its meaning, using these new technologies.

When reading traditionally formatted, line-by-line text, the eye jumps from one word to the next, identifying each ORP along the way until a punctuation mark signals the brain to pause and make sense of it all. This is one of the reasons why it’s hard to recite the alphabet or a song backwards; the components that make them whole are learned in sequence.

Positional Memory Matters

When working with sequential data—which is often the case in IoT—positional memory matters.

Regular neural nets are generally oriented around fixed-size inputs and outputs based on the unidirectional flow of input data in the hidden layer (e.g., a feedforward neural network). Recurrent neural nets (RNNs) incorporate the concept of memory. To do this, a combination of input data and hidden-layer information from each timestep is used as an input for the previous timestep, recursively. It’s this hidden recurrence that adds both the context and the back-end framework that advanced analytics and Machine Learning rely on, spanning everything from handwriting and image recognition to speech and natural language processing (NLP).

The same overarching methodology is gaining attention from companies like Google, via its 2014 acquisition of DeepMind, as the company’s AI-inspired Garage projects make their way into medical, industrial, and retail operations, among others. This methodology will also be crucial for emerging eye-tracking technology solutions to get on the radar.

In the interim, gesture control will serve as the stepping stone for the forthcoming ubiquity of eye-tracking technologies, particularly as they permeate the broader IoT landscape. The fundamental difference is simple: gestures are based on existing hardware but require the user to learn, initiate, and engage with the device for the interaction to occur; eye-tracking technologies allow the user to achieve the same ends as gesture technologies by creating value from something they already do… look.

By Ryan Martin, Senior Analyst at ABI Research

Richard Duffy
Overcoming IT Infrastructure Disaster (Updated: 03.24.2023) One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for ...
Anita Raj
Coronavirus and Telemedicine Technology COVID-19 has brought the world to a near standstill. From NBA to Met Ball and Coachella, all major events and festivals are canceled. Disneyland is shut and movies are postponed. Flights ...
Tosin Vaithilingam
Navigating Economic Uncertainty: Strategies for IT Leaders and MSPs Lately, it seems that each day brings news of more economic uncertainty. Companies that have been navigating the pandemic for the past two and a half ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Mark Greenlaw
Free Cloud Migrations are Expensive The cloud is becoming the primary place where work gets done. By 2025, Gartner estimates that enterprise spending on public cloud computing will overtake traditional IT hardware. Why? One reason ...
Maxim Melamedov
Trouble is Brewing Cloud Paradise - 2023 Will Determine Company's Long-Term Plans for Cloud Use The relationship between developers and the cloud was practically love at first sight. For years, migration to the cloud in ...
David Discenza
Four Ways to Improve Cybersecurity (Updated: December 9th, 2022 ) Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are the targets of these attacks? ...
Drew Firment
Stop Focusing on Cloud Adoption and Start Focusing on Cloud Maturity For the past several years, most organizations have made it their priority to shift much of their applications and data from on-premises to the ...
The Manuscript.png
Answer To Everything.png
Byod.png
The Report.png

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.