Feeds

House of the future to feature talking mirror

Does my bum look big in this?

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Researchers from management consultants Accenture are focussing their powerful brains on what technology the house of the future will contain. They believe that ageing populations in the western world will have an increasing need for houses that can keep an eye on their inhabitants. Technology could also monitor the health of older people and help them stay in touch with their friends and relatives.

The researchers are concentrating on five brilliantly-named projects including "persuasive mirrors" and "connective tables". Persuasive mirrors can apparently show a person what they would look like if they did no excercise and paid no attention to what they ate and drank. This reporter already has one of these devices in his bathroom if anyone from Accenture is interested...

The connective table will use video conferencing to let you play games and socialise with people in different locations.

Accenture is also predicting the arrival of shared scrap books which family members could add pictures and video to but older people could access like an ordinary book.

Interactive pictures could act as a direct way to contact the person pictured. With a camera attached they could be used for video calls. Project leader Luca Rossi said that technology for older people needed to be simpler to use: "... just standing in front of the picture could open a channel to me without doing any funny stuff on the keyboard or logging in," he explained.

Researchers also believe the house of the future will monitor what activity is going on with cameras and software to help it make sense of the images it picks up. Software could monitor facial expressions, posture, gait, focus of attention and what objects they touch or move in the house. This could monitor people's emotional state as well as pick up early signs of age-related illnesses like Alzheimers.

It all sounds fairly familiar, although they've left the obligatory flying car out of their utopian vision. Furthermore, there's no mention of what happens when such technology turns bad. But we at Vulture Central still recall with a shudder the cautionary tale of Maureen from Whitby who was eaten by a cyberloo on a shopping expedition to Newcastle-upon-Tyne. And it is abundantly clear that the Accenture futurologists are not aware of the chilling fate of Italian village Canneto di Caronia. Enough said. ®

Related stories

US develops motorised robobollard
Fire-breathing buses threaten London
Cyberappliances attack Italian village

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.