Feeds

WTF is... the Quantified Self?

Human hacking by the numbers

Security for virtualized datacentres

Me. Myself. I

Ex-banker and personal data advocate Adriana Lukas has been running the London QS group since its inception in September 2010 in a small AV-equipped room in University College London. “We had 30 people in the early days,” says Lukas, “and I always arranged them in a circle for conversations.” Show-and-Tell – individuals presenting their methods and objectives to the rest of the group – is a central part of the original Wolf-Kelly concept, but Lukas was keen to avoid the kind of presenter/audience divide typical of the lecture hall. “Show-and-tell was kind of optional,” says Lukas. “But as the numbers grew – you can’t have a conversation when you have 100 people in the room.”

Currently London QS meetings take place – every six weeks or so – in the larger facilities offered by Google’s Campus in Bonhill St, East London.

FitBit

Not just for jogger: gadgets like Fitbit's One help you record life data

QSers tend to call themselves “self-hackers”, a description coined by Kevin Kelly, who was struck by the similarity between the movement’s early adopters and the amateur personal computer pioneers who formed Silicon Valley’s Homebrew Computer Club in the mid-1970s. Back then if you wanted a computer you had to build your own. There wasn’t a lot you could do with it, except help other people build theirs. What was it for? Who knew? But it was taken for granted that in some way yet to be discovered, personal computers were the Wave of the Future.

“People were driven to build and use those computers because they had a real personal meaning,” says Gary Wolf. And today’s self-hackers feel much the same way about their sensors and data sets.

Adriana Lukas doesn’t mess with the gadgets herself, although at one stage she did experiment with FitBit, a belt clip-on with a motion sensor that measures daily activity. When she lost it she realised her interest was not so much in her own data, but in the more general questions: personal data security and the problem of how to extract meaning from an ocean of raw numerics. So Lukas is hardly your typical self-hacker. But then none of them are. Every QS aficionado seems to have his or her own personal agenda.

Personal data

Sacha Chua, ex-IBM and now a professional social media consultant, occupies what you might call the hardcore end of the QS spectrum. Over the course of last year she collected a formidable amount of data on the overall use of her time. Her main categories include:

  • Sleep
  • Discretionary time spent on hobbies/socialising
  • Personal care routines and exercise
  • Paid Work
  • Unpaid work, including commuting, shopping, household tasks
  • Business skills development

Chua has graphed and correlated these data from 2012 with a view to making the most of her time in 2013. There’s a serious weight of information here, needing some sophisticated statistics to extract meaning. Andy Leigh of the London QS group has a rather more straightforward goal: he simply wants to lose weight – by rowing round the world. In his bedroom.

Sascha Chua's old routine

Sascha Chua used extensive QS techniques to straighten out her chaotic day...

Sascha Chua's new routine

...and organise it into a more productive pattern

Following an injury that restricted a good deal of his customary physical activity, Leigh put on fat. He learned that rowing, if done correctly, could be a useful low-impact exercise. Inspired by the example of Guinness record holder Dave Holby, Leigh ordered himself a rowing machine.

It arrived broken. “So before sending it back, I did what any geek would to do — I took it apart to see how it worked.” Armed with the information of where the machine’s sensors were and how they connected to the front panel display, when the replacement arrived Leigh was able to install his own Arduino in place of the inbuilt proprietary black box.

“The Arduino’s a little computer on a board,” Leigh explained at his London QS Show-and-Tell, “an open source electronics platform that allows you to prototype projects without spending a lot of money and without having to do too much in the way of building stuff yourself.”

New hybrid storage solutions

More from The Register

next story
Apple iPhone 6: Missing sapphire glass screen FAIL explained
They just cannae do it in time, says analyst
Slap my Imp up: Bullfrog's Dungeon Keeper
Monsters need to earn a living too
Oh noes, fanbois! iPhone 6 Plus shipments 'DELAYED' in the UK
Is EMBIGGENED Apple mobile REALLY that popular?
Apple's big bang: iPhone 6, ANOTHER iPhone 6 Plus and WATCH OUT
Let's >sigh< see what Cupertino has been up to for the past year
The Apple Watch and CROTCH RUBBING. How are they related?
Plus: 'NostrilTime' wristjob vid action
Apple's SNEAKY plan: COPY ANDROID. Hello iPhone 6, Watch
Sizes, prices and all – but not for the wrist-o-puter
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.