Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
DESIGNER STATEMENT
Love,
Heidi Gaudet, Kaitlin Jetviroj, and Amanda Sanchez
RESEARCH
WORDS
Provide
Desolate
Shelter
Symbiotic
Endemic
Relationship
Digital
Spiky
Dry
Hot
Barren
Flowers
Juicy
Sweet
Fragrant
Pollen
Succulent
Nocturnal
Timely
Seasonal
Connected
Evolution
Old
Transformative
Microhabitats
T HE MOJAV E DESER T
S Y S T E M DI AGR A M
THE SUN
The Mojave desert and its inhabitants revolve
around the sun. All the plants and animals have
adapted to the desolate environment, resulting in a
unique set of symbiotic relationships.
THE CAC T US
The Organ Pipe Cactus lives for about 150 years.
It begins to bloom at the age of 35. It blooms
between May and June, but only at night. As the
sun starts to rise, the flowers close up for the day.
This makes it difficult for traditional pollinators to
interact with the cactus.
THE BAT
The Long Nose Bat lives in symbiosis with the
Organ Pipe Cactus, acting as the only night
pollinator. The relationship between the bat and
cactus is an example of mutualism: a relationship
in which both actors benefit from each other.
T HE SUN
T HE CAC T US T HE B AT
IDEATION
Endemic Intelligence System
The Endemic Intelligence System (EIS) is your personal data ecosystem and
the hub of all your connected EIS devices. Rather than storing your familys
personal data in the cloud, your information is contained within the walls of
your home. Your WiFiThe Mountain Rangestores and protects all
information collected on you and your family memebers. The Moutain Range
gives you full control over internal and external data access; it puts you in
charge of when and what can be accessed by who.
T HE WORLD
THE DOORKNOB
The doorknob in the transition room provides the
verification you need to enter the server in which
you live. As you place your mask on the doorknob,
it gathers data from your mask and verifies your
identity with a face scan and mask DNA analysis.
THE ANALYST
Using the data gathered from the doorknob, the
analyst scans for security breaches and gives
feedback on the status of your intelligent wear.
Once it clears you of any viruses, it triggers the
doorknob to unlock. You can enter your server.
T HE M ASK
T HE DOORK NOB T HE A N A LY S T
PROTOTYPING
FIRS T ROUND PRO T O T Y PES
T ES T PREPA R AT ION
FRAMEWORK
SYSTEM MAP
THE SYSTEM
In our next iteration, we began to visualize the
behavioral pattern of the system. We played with
ideas of how you are protected, how your data is
displayed, and how each object relates to the other
objects and the system at large. Informed by user
input, we developed a system map, constructed
a scenario, and established an interaction
framework that clearly states the relationship
between the objects.
T HE M ASK USER FEEDB ACK
T HE DOORK NOB T HE A N A LY S T
3D PRINTS: ITER ATION 1
T HE M ASK
T HE DOORK NOB T HE A N A LY S T
3D MODELS: ITER ATION 2
T HE DATA LOCK
Actor: Unknown
BRANDING
BR AND E VOLU TION, Phase 1
Actors: Data Lock (DL), Data Dock (DD), Data Pass (DP)
PROTECTION SYSTEM
PA S S
DOCK
LOCK
BEHIND THE SCENES
END
Heidi Gaudet
Kaitlin Jetviroj
Amanda Sanchez