@Home With iRobots

Is it counterintuitive to predict that one of the impacts of virtual reality will be better indoor maps of the reality we are already in?

It’s not such an outlandish idea, as software developers, device manufacturers and technology firms are already looking to map every nook and cranny of your planet.

The robots are coming

Look at the popular Roomba robotic vacuum cleaner. The device (pictured) already gathers all kinds of data – room dimensions, furniture position and distances between items – data that could help inform next-generation IoT devices.

iRobot, the company behind Roomba, wants to collect this information and sell it to the big software firms:

"There's an entire ecosystem of things and services that the smart home can deliver once you have a rich map of the home that the user has allowed to be shared," Colin Angle, company chief executive told Reuters.

Angle knows that the latest Roomba robot has much more advanced mapping capabilities.

Spatial awareness

To make indoor maps at scale we need technologies that are more capable of recognising and distinguishing between walls, furniture and other items. They need to be accurate, too. The latest high-end Roomba hosts technology that is designed to achieve more with the information it collects, but the direction is certainly toward more detailed special mapping technology.

How can this data be used? Think about spatial technology to help audio equipment manufacturers build better sound stages in your home; intelligent and contextual smart lighting systems; heating and ventilation design. That’s before you end up with holographic furniture ads appearing in your front room while you’re trying to eat.

Apple, Amazon, Microsoft, Google, all four firms are chasing this kind of data.

Apple put indoor maps of airports and malls inside of iOS 11 and has acquired multiple indoor mapping startups (WiFiSLAM, indoor.io, FlyByMedia and so on). Microsoft’s recently announced Path Guide also shows its interest in indoor navigation.

There are implications in retail (with beacons), public transit, energy, telecoms, surveillance, public health and more.

I hope the Electronic Frontier Foundation have begun looking at these matters. Someone needs to translate the significance of the privacy agreements you already sign when you agree to use the products within this emerging value chain.

Ulterior design

We can see it coming. Apple’s ARKit is going to have a profound effect on the development of augmented and virtual reality technologies. You can already see the kind of advances we can expect in new apps for room management, mapping, and interior design.

The developers recently announced plans to use ARKit to develop a new version of the software that will recognize walls, furniture and create a house design model within the app using image recognition. The new app with AR is scheduled to launch in November 2017.

It is important to note that Apple’s ARKit currently only recognizes horizontal planes, but this could potentially change by the time the software ships this fall.

“There is an exciting future for interior design, when smartphones start integrating advanced AR technology,” said Alexey Sheremetyev, CEO of Planner 5D in a press release.

“iPhone 8, for example, will possibly have a depth-sensing camera and will recognize vertical dimensions, such as walls. This would be a huge leap forward also for anyone designing their home.”

Is this an investment opportunity?

Thinking about the potential of indoor mapping technologies and AR, I can’t help but imagine that we may see a little M&A activity in the home mapping app development space.

IoT technologists, platform developers, and other investors will soon recognise the potential significance of these solutions. They (and you) will want to think about who will own the maps created by these technologies, and how might the data contained within those maps be mined?

Computerworld

You Might Also Read: 

Workers' Rights v. Robot Jobs:

Robot Monitors in Homes of the Elderly:

 

« 88% Feel Vulnerable To Data Threats
What Will The Car Of 2040 Be Like? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

iboss Network Security

iboss Network Security

The iboss cloud is designed to deliver Network Security as a Service, in the cloud, using the best malware engines, threat feeds and log analytics engines.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.