The Coming Age of Calm Technology and Open House by Mark Weiser.

Slides:



Advertisements
Similar presentations
Review for Vocabulary Section 3 Quiz. What is the amount of data that can be sent in a certain amount of time? What is the amount of data that can be.
Advertisements

An Introduction to Computers For Middle School Students Mrs. G-Smith (University of Tennessee)
Introduction to Pervasive and Ubiquitous Computing Dr. Tarek Sheltami COE 482.
Introduction to the World of Computers
Ubiquitous Computing: LE1
Ubiquitous Computing: LE1. Ubiquitous Computing "Ubiquitous Computing is fundamentally characterized by the connection of things in the world with computation“
Computer Systems.
1 Ubiquitous Computing CS376 Reading Summary Taemie Kim.
© Siemens, 2001ICM N Cliparts.ppt, 12/11/2001Page 1 ICM N Cliparts Arrows.
ISA5428: 普及計算 Pervasive Computing Course Outline 金仲達教授 清華大學資訊系統與應用研究所 九十三學年度第一學期 (Slides are taken from the presentations by Prof. Friedemann Mattern of.
IIS and PWS. What is IIS and PWS? Microsoft Internet Information Server (IIS) and Peer Web Services (PWS) enable Windows NT servers with the ability to.
Thin Client vs. Desktop Advantages and Disadvantages of Operating System Environments.
30/11/ Q & A on Networking. Question No. 1 What is Networking? Two or more computers that are linked in order to share – Resources (such as printers.
Distributed Processing Terminal-Host Systems File Server Program Access Client Server Processing.
Mobile Computing Applications Nour El Kadri Based on Jani Kurhinen Notes.
English Language (1) for Computer Students “ENG 126”
Pervasive & Ubiquitous Computing
Jan 11, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Class participation is very important. You will be graded on your involvement in class discussions.
Computing services for the Traveling Physicist Alberto Pace CERN – Information Technology Division.
1 Pervasive & Ubiquitous Computing Hao Chu ( 朱浩華 ) Lecture #2 3/1/2004.
An Overview of Using Computers
Computing Review Questions. Record your responses in your Computing 101 notebook.
Simple Mail Transfer Protocol (SMTP)
Context-Aware & Yet Another service Hiromitsu Kato Systems Development Lab. Hitachi, Ltd. UBICOMP2002 W7: Security in Ubiquitous.
Cloud Computing.
Ubiquitous Computing Software Systems.
1. 2 Tier I/II $Ks Tier III/IV $Ms Tier V/VI $Bs Create New Vulnerabilities Discover New Vulnerabilities Exploit Known Vulnerabilities.
1 Chapter 7 Designing for the Human Experience in Smart Environments.
Computing History Milestones
Basic Computer Networks Configurations School of Business Eastern Illinois University © Abdou Illia, Fall 2009 (August 27th, 2009)
VoIP Switchboard  Emad Ashour  Rami Shobi. PSTN Connected World Web Connected World LAN Connected company Voice Modem/ Full Duplex Line Internet Connection.
Local Network for 3GPP Meeting 1. Directory Configuration for 3GPP Meeting 2. How to connect your PC to Local Network 3. Set Up for Microsoft NetMeeting.
Week 5: Ubiquitous Computing Pattie Maes MIT Media Lab
Remote Controller & Presenter Make education more efficiently
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
Networking Components 10/2/07. Parts of a Network Clients –Computers that request or order information from a server –Usually desktop computers with their.
“Machines that fit the human environment, instead of forcing humans to enter theirs, will make using a computer as refreshing as taking a walk in the woods.”
From Technological Determinism to Calm Technology IML 101: The Languages of New Media.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
Computers Are Smarter Than Humans Or Are They???
1st RENAM UC – 2007 RENAM National Research and Education Network User’s Conference CHISINAU, ASEM May, 2007 Science and Education in the Information.
Enterprise Network Systems Client/ Server Mark Clements.
The transformational capacity of ubiquitous and contextual computing.
Digital Literacy Lesson 2. Hardware Hardware: the physical components of a computer. Includes input devices, processing devices, storage devices, and.
Welcome to How Will Check IP Address On Windows 7.
Windows Azure poDRw_Xi3Aw.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
IP4 Address Scheme. The IP4 addressing scheme uses a series of 4 bytes. This is called dotted decimal notation when viewed in Base 10. Example:
By Mr Mohammed. Objectives Describe what a client/server network is Some students will be able to explain the difference between the two networks along.
Informative art Lars Erik Holmquist Mobile Life Center Stockholm University & SICS
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
A Seminar On. What is Cloud Computing? Distributed computing on internet Or delivery of computing service over the internet. Eg: Yahoo!, GMail, Hotmail-
Ipv6 Firewall Features & Benefits. Ipv6 Firewall  Internet Protocol v6 is the latest version of IP that serves the function of providing a unique identification.
Net-Centric Computing Overview
5G is coming Zoltán Turányi 5G Expert, Ericsson Research
Parts of a computer Vocabulary & Labeling.
Virtual Private Networks
Smart Car through IoT 라이 아샤리 리날디
Em4 Ethernet tutorial Remote connection.
Introduction To Computers
Project Lightspeed TelcoTV Update
Uses of Computer Networks Computer courses in Chandigarh.
1.3 The All-Purpose Machine
NUTV – Basic and Expanded Service
The coming age of Calm technology
Ubiquitous Computing By: Patrick Yienger.
Mapping a network drive
Read this to find out how the internet works!
Introduction to JavaScript
Introduction and History
Presentation transcript:

The Coming Age of Calm Technology and Open House by Mark Weiser

The Coming Age of Calm Technology Phase I – The Mainframe Era Phase II – The PC Era Transition: Internet and distributed computing Phase III – The UC Era ComputerUser ComputerUserComputerUser

The UC Era Lots of computers sharing each of us –Internet servers –Embedded/wearable computers Technology prerequisites –Internet –Microprocessors From thin clients to thin servers. –Everything is adressable (over IP)

Calm Technology Encalms and Informs The users remain serene and in control Engages our peripheral attention –Allows us to attune to more things –A large portion of our brain is devoted to peripheral processing Moves easily from center to periphery and back –Recenter to take control –Ex: Car engine; when not OK we notice it

Examples of calm technology Inner office windows –Peripheral two way information channel –You can catch the other persons attention Internet multicast –Sustains ongoing relationships between machines, places and people Dangling string –Rotation speed connected to network traffic –Vision, sound and touch

Open House, Mark Weiser Interacting with computer Dwelling with computers Many persons per computer Many computers per person Smart houses/ applications/assistants

Dwelling with computers Interacting with computers –Computers will inhabit the most trivial things –Interacting with something keeps it distant and foreign –We don’t want to interact with our everyday environment in the same way as we interact with computers

Dwelling with computers Dwelling with computers: –Co-exist comfortably –Provide clues about environment –We can ignore them most of the time –Like weather, street sounds –Suggestive but not intermediating Examples –Augmented window –Wake up music-chooser

Dwelling vs. Smart “Smart” is a bad metaphor Does all things get better if they get smarter? –Smart house = better house? –Smart Cappuccino? It is not enough to put computers everywhere. You must specify what they should do.