Computing devices such as smartphones and tablets are typically configured with graphical elements, such as icons and the like, on their graphical user interfaces (GUI), which can be used to launch a variety of applications for device users.
A digital assistant supported on a computing device such as a smartphone, tablet, personal computer (PC), wearable device, media player, and the like is configured to automatically select and display graphical elements associated with applications, such as icons, and manage device resources responsively to monitored context data. The digital assistant may collect and analyze context data associated with the device and/or device user to select and display application icons on the device GUI that are relevant to a current context to enhance utility for the user. The context data can be collected using, for example, device sensors, application data, and monitored patterns of application usage by the user at different times of the day and locations. The digital assistant can select applications and system processes for execution based on context data that describes current device state (e.g., battery charge, network connectivity, processor and memory utilization, etc.), or predicted future states. The digital assistant may also be configured to selectively suppress or filter application and system processes according to current or predicted future states.
In an illustrative example, with notice to the user and user consent, the digital assistant may monitor the user's application usage associated with visits to a coffee shop to create a history. The digital assistant may monitor, recognize, and store data for a historical user pattern in which the user goes home after work, and then travels to the coffee shop to stream and watch a television show on his device. The digital assistant can employ the history to automatically download the latest or unwatched episodes of the television show while a device is connected to the Internet over the user's home Wi-Fi. This way, the user is not inconvenienced while waiting for the show to download at the coffee shop and may also save on cellular data charges, for example, if the coffee shop does provide a free Wi-Fi access point.
The digital assistant may intelligently select application icons with which the user has a history of interaction while at the coffee shop, and feature those icons on the device GUI. For example, the digital assistant may select a streaming media application (e.g., for movies/television) and the coffee shop's beverage application that provides rewards and perks for frequent customers. The current device display can be customized to the user or be configured to feature the selected icons in a contextual GUI. The user can toggle between the user-customized GUI and the contextual GUI using, for example, touch-based gestures on a touch screen, non-touch-based gestures, natural language or voice commands, or actuation of a button (e.g., real or virtual buttons) or other user controls.
In another illustrative example, the digital assistant may organize the GUI based on a state of system processes and/or resources. For example, if the device is currently low on battery charge and has a pending system update, the digital assistant can suppress the update for a later time, for example, when the device is more fully charged or plugged into an electrical outlet. If the device is operating using a cellular data connection, the digital assistant can suppress downloading the system update, for example, until the device is back on the user's low-cost Wi-Fi home network. The digital assistant may also selectively filter application icons from the GUI, or control the appearance of the GUI, based on the context. For example, the digital assistant may dim the screen, black out portions of the screen, or remove contextually-irrelevant icons from the GUI. The digital assistant can further display only contextually-relevant icons on the GUI. Such actions can conserve battery power while tailoring the GUI to improve the efficiency of the user-machine interface.
Other processes can also be suppressed or filtered based on applicable context. For example, if the user and device are in a moving car, the device's automated Wi-Fi seeking feature can be suppressed until the device is stationary. In addition, some e-mail (e.g., advertisements, junk mail, mail from unknown parties) can be filtered so that the device does not alert the user of the incoming e-mail. Thus, the digital assistant can intelligently select and display application icons, suppress application execution, and selectively filter application and system processes to proactively manage resources and enhance device functionality.
Advantageously, the digital assistant's intelligent monitoring, selection and filtering of icons and applications, enables the device operations to be optimized for a resource-efficient user experience. The digital assistant enables improvements in device operations to be realized by conserving system resources by selecting, organizing, and displaying contextually-relevant and useful icons to the user throughout the day.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure. It will be appreciated that the above-described subject matter may be implemented as a computer-controlled apparatus, a computer process, a computing system, or as an article of manufacture such as one or more computer-readable storage media. These and various other features will be apparent from a reading of the following Detailed Description and a review of the associated drawings.
Like reference numerals indicate like elements in the drawings. Elements are not drawn to scale unless otherwise indicated.
For example, applications represented by graphical elements such as icons 120 across the displays 115 of devices 110 in
The applications and GUI interfaces may interoperate with the OS layer 215. The OS layer can manage systems and resources 240, provide the GUI interface 245 for the user, and operate application and programs 250. Thus, if a user selects an application, the OS layer can execute the functions and processes associated with the selected application, such as run the calculator, maps, or digital assistant. In addition, the OS layer may interoperate with the hardware layer 220 and manage the various hardware components. For example, the hardware layer can include one or more processors 255 such as central processing units (CPU) and graphic processing units (GPU), memory 260 (e.g., hard-disk drive, flash memory, etc.), and also user input/output devices such as a pointer (e.g., mouse) 265 or microphone 270. Other input/output devices not shown include a keyboard, touch screen display, and speakers.
As further illustrated in the environment 300, the digital assistant may include an optimization client 320 that is configured to select and present relevant icons, suppress application operations, and filter application operations, all based on relevant and up-to-date context data. The optimization client may be incorporated as part of the digital assistant, such as a sub-routine or other programmatic construct that is implemented in the local or remote digital assistants.
Alternatively, the functionality of the optimization client may be separately instantiated from the device and digital assistant altogether, and operate on a remote server, as depicted by the remote optimization service 325. Therefore, discussions that describe any utilization or processes performed by the digital assistant may include any one or a combination of the local or remote digital assistants and the local or remote optimization clients or service.
For example, in response to the low battery warning 520, the display has been dimmed/darkened to preserve battery power. Simultaneously, certain critical or relevant applications are displayed, such as the messaging and phone icons. As depicted in presentation 515, critical background operations may still be performed to operate the device. As discussed in further detail below, based on a status of system resources (e.g., a low battery scenario), the digital assistant may suppress certain programs/applications and filter certain programs/applications. These operations may be performed to prolong the device's battery life and simultaneously provide relevant applications to the user and perform useful tasks.
At step 710 the digital assistant identifies current context data. For example, the digital assistant may analyze or monitor, with notice to the user and user consent, the context data described with respect to
At step 715 the digital assistant determines one or more operations to perform based on the usage patterns (step 705) and current context data (step 710). The operations may include, for example, selecting associated icons for presentation on the display of the user's device and managing system programs, applications, and resources. These determined operations may be based on future predictions of what will occur (e.g., based on usage patterns) or present implementations (e.g., real-time updates based on real-time context data).
Thus, the digital assistant pre-fetches the television show 830 while connected to Wi-Fi and organizes relevant icons 835 that the user may use at the coffee shop. The digital assistant downloads the television show while the user is at home connected to Wi-Fi so that the show is ready to view upon arrival at the coffee shop. Furthermore, this avoids the possibility that the coffee shop does not have Wi-Fi, has slow connectivity due to insufficient bandwidth, etc.
The digital assistant adjusts various processes as well. For example, the digital assistant suppresses programs or applications 1125. This can include suppressing entire applications or programs 1215, such as non-essential or low-importance applications (e.g., weather application, social media applications, etc.).
When the digital assistant filters system operations 1130, the digital assistant may permit user-preferred operations (e.g., certain applications and programs) 1220, permit critical operations 1225, suppress application/system updates 1230, and suppress portions of applications 1235. The digital assistant can suppress a portion of an application by suppressing one or more functions associated with the application, while still permitting one or more functions to occur, such as suppress notifications 1240 (e.g., allow user to send and receive messages, but suppress notifications of incoming messages). Additional examples in which the digital assistant suppresses portions of applications can include only issue notification of incoming communication/message from selected individuals, suppress financial notifications unless notification pertains to fraud or theft on an account, disable messaging component to receive messages, disable transceiver or network component to receive signals/data from other devices or servers, etc. Furthermore, user preferences can override functions that the digital assistant selected to perform or not to perform.
At step 1705 the digital assistant identifies nearby establishments (e.g., food, coffee shops) pertinent to the user based on context data. For example, the digital assistant may make associations based on contacts that are nearby, meeting places set up in the calendar, establishments that the user has visited previously, such as a threshold number of times, etc. Therefore, the digital assistant utilizes the context data personal to the user, applies the context data to the user's current contextual situation, and makes predictions. The digital assistant makes comparisons between prior usage, present usage, present location, and predicted future usage to make the most coherent prediction.
At step 1710 the digital assistant determines whether or not to limit the device's performance or functionality. This may occur, for example, based on system capabilities such as low battery 1740, user preferences 1745, or other context 1750. If the digital assistant determines not to limit the device's performance, then the digital assistant may regularly and periodically determine relevant applications and update user interface 1715 as the user continues to travel along the street.
If the digital assistant determines to limit the device's performance or functionality (e.g., to preserve battery life), the device may function in a reduced function mode at step 1720. In the reduced function mode, there may be one or more functions that the device can perform. For example, the device may reduce or stop updating the user interface (e.g., with relevant icons) 1725, suppress programs/applications 1730, or filter device operations 1735.
In this scenario, the digital assistant may filter applications that are more relevant relative to other applications. For example, there may be insufficient reason to cause the digital assistant to place an icon on the display in the reduced operation mode for an establishment that the user has previously frequented. However, in the scenario in
The user may not want the device to continuously update icons on the display while walking on a business-congested street. Thus, the user may set preferences in the reduced operation mode to reduce the rate at which the digital assistant determines relevant applications and updates the display, regardless of the status of the system's capabilities.
In step 1805, context data that is associated with a computing device is monitored. In step 1810, usage patterns that are based on the monitored context data are identified. In step 1815, a future operation is identified, in which the future operation is based on the identified usage patterns. In step 1820, data that is associated with the identified future operation is pre-fetched, such that the pre-fetched data is utilized to perform the future operation.
A number of program modules may be stored on the hard disk 2128, magnetic disk 2130, optical disk 2138, ROM 2117, or RAM 2121, including an operating system 2155, one or more application programs 2157, other program modules 2160, and program data 2163. A user may enter commands and information into the computer system 2100 through input devices such as a keyboard 2166 and pointing device 2168 such as a mouse. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, trackball, touchpad, touchscreen, touch-sensitive device, voice-command module or device, user motion or user gesture capture device, or the like. These and other input devices are often connected to the processor 2105 through a serial port interface 2171 that is coupled to the system bus 2114, but may be connected by other interfaces, such as a parallel port, game port, or universal serial bus (USB). A monitor 2173 or other type of display device is also connected to the system bus 2114 via an interface, such as a video adapter 2175. In addition to the monitor 2173, personal computers typically include other peripheral output devices (not shown), such as speakers and printers. The illustrative example shown in
The computer system 2100 is operable in a networked environment using logical connections to one or more remote computers, such as a remote computer 2188. The remote computer 2188 may be selected as another personal computer, a server, a router, a network PC, a peer device, or other common network node, and typically includes many or all of the elements described above relative to the computer system 2100, although only a single representative remote memory/storage device 2190 is shown in
When used in a LAN networking environment, the computer system 2100 is connected to the local area network 2193 through a network interface or adapter 2196. When used in a WAN networking environment, the computer system 2100 typically includes a broadband modem 2198, network gateway, or other means for establishing communications over the wide area network 2195, such as the Internet. The broadband modem 2198, which may be internal or external, is connected to the system bus 2114 via a serial port interface 2171. In a networked environment, program modules related to the computer system 2100, or portions thereof, may be stored in the remote memory storage device 2190. It is noted that the network connections shown in
The architecture 2200 illustrated in
The mass storage device 2212 is connected to the CPU 2202 through a mass storage controller (not shown) connected to the bus 2210.The mass storage device 2212 and its associated computer-readable storage media provide non-volatile storage for the architecture 2200.
Although the description of computer-readable storage media contained herein refers to a mass storage device, such as a hard disk or CD-ROM drive, it may be appreciated by those skilled in the art that computer-readable storage media can be any available storage media that can be accessed by the architecture 2200.
By way of example, and not limitation, computer-readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. For example, computer-readable media includes, but is not limited to, RAM, ROM, EPROM (erasable programmable read only memory), EEPROM (electrically erasable programmable read only memory), Flash memory or other solid state memory technology, CD-ROM, DVDs, HD-DVD (High Definition DVD), Blu-ray, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the architecture 2200.
According to various embodiments, the architecture 2200 may operate in a networked environment using logical connections to remote computers through a network. The architecture 2200 may connect to the network through a network interface unit 2216 connected to the bus 2210. It may be appreciated that the network interface unit 2216 also may be utilized to connect to other types of networks and remote computer systems. The architecture 2200 also may include an input/output controller 2218 for receiving and processing input from a number of other devices, including a keyboard, mouse, or electronic stylus (not shown in
It may be appreciated that the software components described herein may, when loaded into the CPU 2202 and executed, transform the CPU 2202 and the overall architecture 2200 from a general-purpose computing system into a special-purpose computing system customized to facilitate the functionality presented herein. The CPU 2202 may be constructed from any number of transistors or other discrete circuit elements, which may individually or collectively assume any number of states. More specifically, the CPU 2202 may operate as a finite-state machine, in response to executable instructions contained within the software modules disclosed herein. These computer-executable instructions may transform the CPU 2202 by specifying how the CPU 2202 transitions between states, thereby transforming the transistors or other discrete hardware elements constituting the CPU 2202.
Encoding the software modules presented herein also may transform the physical structure of the computer-readable storage media presented herein. The specific transformation of physical structure may depend on various factors, in different implementations of this description. Examples of such factors may include, but are not limited to, the technology used to implement the computer-readable storage media, whether the computer-readable storage media is characterized as primary or secondary storage, and the like. For example, if the computer-readable storage media is implemented as semiconductor-based memory, the software disclosed herein may be encoded on the computer-readable storage media by transforming the physical state of the semiconductor memory. For example, the software may transform the state of transistors, capacitors, or other discrete circuit elements constituting the semiconductor memory. The software also may transform the physical state of such components in order to store data thereupon.
As another example, the computer-readable storage media disclosed herein may be implemented using magnetic or optical technology. In such implementations, the software presented herein may transform the physical state of magnetic or optical media, when the software is encoded therein. These transformations may include altering the magnetic characteristics of particular locations within given magnetic media. These transformations also may include altering the physical features or characteristics of particular locations within given optical media to change the optical characteristics of those locations. Other transformations of physical media are possible without departing from the scope and spirit of the present description, with the foregoing examples provided only to facilitate this discussion.
In light of the above, it may be appreciated that many types of physical transformations take place in the architecture 2200 in order to store and execute the software components presented herein. It also may be appreciated that the architecture 2200 may include other types of computing devices, including handheld computers, embedded computer systems, smartphones, PDAs, and other types of computing devices known to those skilled in the art. It is also contemplated that the architecture 2200 may not include all of the components shown in
The illustrated device 110 can include a controller or processor 2310 (e.g., signal processor, microprocessor, microcontroller, ASIC (Application Specific Integrated Circuit), or other control and processing logic circuitry) for performing such tasks as signal coding, data processing, input/output processing, power control, and/or other functions. An operating system 2312 can control the allocation and usage of the components 2302, including power states, above-lock states, and below-lock states, and provides support for one or more application programs 2314. The application programs can include common mobile computing applications (e.g., image-capture applications, email applications, calendars, contact managers, web browsers, messaging applications), or any other computing application.
The illustrated device 110 can include memory 2320. Memory 2320 can include non-removable memory 2322 and/or removable memory 2324. The non-removable memory 2322 can include RAM, ROM, Flash memory, a hard disk, or other well-known memory storage technologies. The removable memory 2324 can include Flash memory or a Subscriber Identity Module (SIM) card, which is well known in GSM (Global System for Mobile communications) systems, or other well-known memory storage technologies, such as “smart cards.” The memory 2320 can be used for storing data and/or code for running the operating system 2312 and the application programs 2314. Example data can include web pages, text, images, sound files, video data, or other data sets to be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks.
The memory 2320 may also be arranged as, or include, one or more computer-readable storage media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable media includes, but is not limited to, RAM, ROM, EPROM, EEPROM, Flash memory or other solid state memory technology, CD-ROM (compact-disc ROM), DVD, (Digital Versatile Disc) HD-DVD (High Definition DVD), Blu-ray, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the device 110.
The memory 2320 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server to identify users and equipment. The device 110 can support one or more input devices 2330—such as a touchscreen 2332; microphone 2334 for implementation of voice input for voice recognition, voice commands and the like; camera 2336; physical keyboard 2338; trackball 2340; and/or proximity sensor 2342; and one or more output devices 2350—such as a speaker 2352 and one or more displays 2354. Other input devices (not shown) using gesture recognition may also be utilized in some cases. Other possible output devices (not shown) can include piezoelectric or haptic output devices. Some devices can serve more than one input/output function. For example, touchscreen 2332 and display 2354 can be combined into a single input/output device.
A wireless modem 2360 can be coupled to an antenna (not shown) and can support two-way communications between the processor 2310 and external devices, as is well understood in the art. The modem 2360 is shown generically and can include a cellular modem for communicating with the mobile communication network 2304 and/or other radio-based modems (e.g., Bluetooth® 2364 or Wi-Fi 2362). The wireless modem 2360 is typically configured for communication with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the device and a public switched telephone network (PSTN).
The device can further include at least one input/output port 2380, a power supply 2382, a satellite navigation system receiver 2384, such as a GPS receiver, an accelerometer 2386, a gyroscope (not shown), and/or a physical connector 2390, which can be a USB port, IEEE 1394 (FireWire) port, and/or an RS-232 port. The illustrated components 2302 are not required or all-inclusive, as any components can be deleted and other components can be added.
Various exemplary embodiments of the present contextual experience based on location are now presented by way of illustration and not as an exhaustive list of all embodiments. An example includes a method to dynamically update graphic elements on a graphical user interface (GUI) of a computing device, comprising: monitoring context data associated with the computing device; identifying usage patterns of the computing device based on the monitored context data; identifying a future operation based on the identified usage patterns, wherein the future operation is predicted to occur based on the usage patterns; pre-fetching data associated with the identified future operation, wherein the pre-fetched data is utilized for the computing device to execute the future operation.
In another example, the pre-fetched data includes one or more of data associated with music, audio, movie, television, video, or image. In another example, additional context data includes one or more of location data, contact data, communication data, status of system resources, status of tasks to perform, user feedback, or third-party feedback, and the identified future operation is further based on one or more of the additional context data. In another example, the method further comprises: predicting one or more applications for future use based on the usage patterns; and replacing a previous GUI configuration with graphical elements associated with the one or more predicted applications, wherein the replacing includes re-configuring the GUI to add graphical elements associated with the predicted one or more applications. In another example, the predicting is based on the one or more applications being used at or about a location a threshold number of times. In another example, the identified future operation is based on the one or more applications being used at the location the threshold number of times, and the pre-fetched data for the future operation is associated with the one or more applications. In another example, the predicting is further based on user feedback to a previously presented GUI based on the prediction. In another example, the method further comprises filtering functions performed by the device based on the identified future operation, wherein the device filters functions by one or both of suppressing an aspect of a program or permitting an aspect of the program.
A further example includes a device, comprising: one or more processors; one or more hardware-based memory devices storing a plurality of applications and exposing a digital assistant, and further storing computer-readable instructions which, when executed by the one or more processors cause the computing device to: monitor context data associated with the device; identify a status of system resources based on the monitored context data; and filter system operations based on the identified status, wherein the filtering includes managing operations performed by the device, wherein the managing includes suppressing entire applications and suppressing sub-parts of applications.
In another example, the status of system resources includes one or more of battery life or tasks to be performed by the device. In another example, the tasks to be performed include one or more of system updates, application updates, or anti-virus scans. In another example, the suppressing includes one or more of not accepting signals or messages from other devices, not providing a notification of an incoming message, not providing a notification of an update, or not performing a function associated with an application. In another example, the filtering includes: selecting which functions associated with the device to perform and not to perform; permitting performance of the functions selected to perform; and suppressing performance of the functions selected not to perform. In another example, the device further comprises: receiving preferences from a user; and overriding the selected functions to perform and not to perform based on the received preferences. In another example, the device further comprises: selectively dimming portions of a display of the device when the status of system resources indicates to preserve battery resources; and determining relevant graphical elements based on the context data; and displaying the determined relevant graphical elements.
A further example includes one or more hardware-based computer-readable memory devices storing instructions which, when executed by one or more processors disposed in a computing device, cause the computing device to: periodically monitor a user location associated with the computing device; periodically identify associated locations based on context data, wherein the associated locations are based on the monitored user location of the computing device being within a threshold distance to the associated locations; determine an application based on the identified associated locations; display the determined application; and periodically update the determined application as the user location changes.
In another example, the instructions further cause the computing device to monitor context data associated with the computing device, and the associated locations are associated with context data of the computing device. In another example, the instructions further cause the computing device to: determine, based on context data, whether to limit performance of the computing device; and when the determination indicates to limit performance, then operate the computing device in a reduced function mode. In another example, the reduced function mode includes periodically determining and updating the application at a reduced rate. In another example, the reduced function mode includes suppressing actions of the computing device and filtering functions of the computing device.
The subject matter described above is provided by way of illustration only and is not to be construed as limiting. Various modifications and changes may be made to the subject matter described herein without following the example embodiments and applications illustrated and described, and without departing from the true spirit and scope of the present invention, which is set forth in the following claims.