UC Berkeley researcher and artist Eric Paulos and his students continue their explorations of "cosmetic computing" with a new prototype and paper about "Human Hair as Interactive Material." If you'd like to coif your own computational locks, they've posted a how-to guide on Instructables. From their research page:
Human hair is a cultural material, with a rich history displaying individuality, cultural expression and group identity. It is malleable in length, color and style, highly visible, and embedded in a range of personal and group interactions. As wearable technologies move ever closer to the body, and embodied interactions become more common and desirable, hair presents a unique and little-explored site for novel interactions. In this paper, we present an exploration and working prototype of hair as a site for novel interaction, leveraging its position as something both public and private, social and personal, malleable and permanent. We develop applications and interactions around this new material in HäirIÖ: a novel integration of hair-based technologies and braids that combine capacitive touch input and dynamic output through color and shape change. Finally, we evaluate this hair-based interactive technology with users, including the integration of HäirIÖ within the landscape of existing wearable and mobile technologies.
For more, please listen to Mark Frauenfelder and I interview Eric about Cosmetic Computing in this episode of For Future Reference, a podcast from Institute for the Future:
Canada’s prime minister Justin Trudeau says the country has signed an agreement with Amazon.com for the distribution of critical emergency medical supplies such as masks, face shields, gowns, ventilators, and test kits in the COVID-19 crisis.
“Researchers conclude that Zoom uses non-industry-standard cryptographic techniques with identifiable weaknesses and is not suitable for sensitive communications.”
The suddenly popular videoconferencing app Zoom has issued a patch for a vulnerability in its Windows client that allowed attackers to steal the user’s Windows login credentials from malicious chat links. Hi @zoom_us & @NCSC – here is an example of exploiting the Zoom Windows client using UNC path injection to expose credentials for use […]
Gather round, young and old — and hear tales of bygone days. Back in olden times, citizens would mass at a house of coffee, wherein skilled java alchemists would concoct special blends and apply artisanal wizardry to make each steaming chalice an appointment for the taste buds. Granted, said wizards, once known as baristas, were […]
The last few weeks have given us all a lot to think about. As we watched stores close, Costco lines snake through parking lots and items like hand sanitizer and toilet paper disappear everywhere like they were Lady Gaga tickets, there’s one significant takeaway it’s safe to say we all can agree on. We should […]
Whether it was Bach or Chopin, Ray Charles or Jerry Lee Lewis, Stevie Wonder, Elton John, Alicia Keys or Norah Jones, there was someone whose mastery on the piano made you think, wow, I wish I knew how to do that. It’s a singular, almost timeless skill — and if you love music, there’s no […]