Life Logging

LifeLogging- History Recording Technology (2 Types)

  • Definition- augmentation technologies that record and report the intimate states and life histories of objects and users, in support of object-and self-memory, observation, communication, and behavior modeling
  • LifeLogging Technologies utilize 2 important components:
    1. Intimate- technologies that are focused inwardly, on the identity and actions of the individual or object; this means technologies where the user (or semi-intelligent object) has agency in the environment, either through the use of an avatar/digital profile or through direct appearance as an actor in the system
    2. External- technologies that are focused outwardly, towards the world at large; these technologies provide information about and control of the world around the user.

1) Object Lifelogs (spimes/blogjects, etc.)

  • Definition- maintain a narrative of use, environment and condition for physical objects
    • GPS lifelogs such as TrackStick- technology that interfaces Google Earth and tracks one's movements and trends via GPS
    • Another example, Nike and Apple recently teamed together to turn shoes into LifeLogs; using sensors embedded in your sneakers to track steps and distances.

2) User lifelogs (life-caching/documented lives)

  • Definition- allow people to make similar recording of their own lives
    • The digital cell phone- one of the first technology that allowed users to capture documents and pictures, and share them online
    • The idea of tagging and annotating photos was first promoted by Flickr & Nokia


  • Between augmented reality and lifelogging- the development of sophisticated interface for experiencing an enhanced awareness of one’s physical and social environment; and sufficient network capacity to support full-personal use
  • Between lifelogging and virtual worlds- the emergence of a consistent digital identity allowing for seamless interaction between in-person and virtual representation of other people.
    • This relationship will require an infrastructure that is open across multiple platforms, secure against spoofing, and able to recognize that you are you, regardless of how or where you are connecting from
Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License