“Machines that fit the human environment, instead of forcing humans to enter theirs, will make using a computer as refreshing as taking a walk in the woods.”

Slides:



Advertisements
Similar presentations
Chapter 2, part 3 Human Aspects: Interface Metaphors and Conceptual Models... What is a metaphor? Traditionally, metaphors were used in speech where things.
Advertisements

Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Slide 1 of 7 Turning off Ad-Hoc Mode Ad-Hoc mode can be a real problem for wireless connectivity at meetings. Systems that accidentally enter.
Blue Eye T E C H N O L G Y.
1 The Ubiquitous Web Eunchae Yoon. School of Engineering, Eunchae Yoon 2 Contents What is Ubiquitous computing? What is Ubiquitous Web? Ubiquitous computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/11/2011 Security and Privacy in Cloud Computing.
Introduction to Pervasive and Ubiquitous Computing Dr. Tarek Sheltami COE 482.
Peter Kropf Ubiquitous Computing - Hiver 2006/20071 Peter Kropf Université de Neuchâtel Institut d’informatique
MIT Project Oxygen. Vision  “…computation has centered about machines, not people”.  “In the future, computation will be human-centered. It will be.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Different types of operating systems including: – Single-user – Multi-user – Multi-tasking – Interactive – Real-time – Batch processing – Distributed.
1 Ubiquitous Computing CS376 Reading Summary Taemie Kim.
Tangible Interactions and Augmented Reality Nirav Mehta Anne Marie Piper.
The Coming Age of Calm Technology and Open House by Mark Weiser.
Ubiquitous Computing The death of PC?. Ubiquitous Computing ubiquitous = Being or seeming to be everywhere at the same time; omnipresent. Mark Weiser,
ISA5428: 普及計算 Pervasive Computing Course Outline 金仲達教授 清華大學資訊系統與應用研究所 九十三學年度第一學期 (Slides are taken from the presentations by Prof. Friedemann Mattern of.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Technology Timeline Carman Seely 3 rd period. First Computer The word “computer” was first recorded being used in 1613 and was originally used to describe.
User Interface Theory & Design
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Configuring the MagicInfo Pro Display
ITIS 2110 Class # No home network devices devices devices devices devices devices devices 9.
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
Jan 11, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements Class participation is very important. You will be graded on your involvement in class discussions.
Type of Software There are two main types of software They are System software Application software Hardware System Software (OS) Application Software.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
Some Computer Science Issues in Ubiquitous Computing Presenter : Junghee-Han Mark Weiser Communications of the ACM, July 1993.
Fall 2002CS/PSY Pervasive Computing Ubiquitous computing resources Agenda Area overview Four themes Challenges/issues Pervasive/Ubiquitous Computing.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 9.
ISNE 101 Week 8 Dr. Ken Cosh. Next Assignment!  Choose a Movie (Futuristic)  First Come, First Served – different movies – get my approval first! 
Ubiquitous Computing Computers everywhere. Where are we going? What happens when the input is your car pulls into the garage, and the output is the heat.
Ubiquitous Computing Software Systems.
1 Chapter 7 Designing for the Human Experience in Smart Environments.
SWE 4324 UCD - WEB A FINAL VERSION Evaluation of a feature Note about Webs – Webs are the interactive class you must participate for a satisfactory understanding.
© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of 1-1 HCI Human Computer Interaction Week 8.
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Week 5: Ubiquitous Computing Pattie Maes MIT Media Lab
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
Trends in Embedded Computing The Ubiquitous Computing through Sensor Swarms.
User Interface Theory & Design Lecture 6a 1.  User interface is everything the end user comes into contact with while using the system  To the user,
Beyond The Desktop The Future of the Interface. The co-evolution of hardware, interface and users Punched cards Character displays and keyboards Graphical.
From Technological Determinism to Calm Technology IML 101: The Languages of New Media.
Chapter 28 - Remote Login and Remote Desktops(TELNET) Introduction Early Computers Used Textual Interfaces A Timesharing System Requires User Identification.
Federated Devices: Augmenting Mobility with Ambient Resources Frankie James, Ph.D. SAP Research, RC Palo Alto.
Stanford hci group / cs147 u 27 November 2007 Ubiquitous Computing & “Natural” Interaction Scott Klemmer tas: Marcello Bastea-Forte,
Bottles : A Transparent Interface as a Tribute to Mark Weiser Hiroshi Ishii (MIT)
The transformational capacity of ubiquitous and contextual computing.
Ubiquitous, Domestic and Tangible Computing A new way of thinking Saul Greenberg University of Calgary CPSC
An operating system (OS) is a collection of system programs that together control the operation of a computer system.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
Ubiquitous Computing. Definition Ubiquitous computing describes a way that humans and computers interact. Bringing computers into and interacting with.
CPT 123 Internet Skills Class Notes Ubiquitous Computing Session.
Mobile Networks & Computing Mobile computing : Some Definitions 1 NYANZI A CCNP,CCNAI,CCNA, A+, MIT-SANA, MBA_IT.
European Computer Driving Licence Syllabus version 5.0 Module 1 – Concepts of ICT Chapter 1 – General concepts Pass ECDL5 for Office 2007 Module 1 Concepts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
European Computer Driving Licence
Gustavo Pedroso Unobtrusive user interfaces for ubiquitous computing: a state of the art of the computer to human communication.
Networking Applications
Chapter 6: Interfaces and interactions
Computer Peripherals Keyboard, Printers, Mouse, Monitors IT Excess
The coming age of Calm technology
Managing the Information Technology Resource Jerry N. Luftman
IGE105 – Communication Technology in a Changing World
NWC604COM Ubiquitous Computing
Pervasive Computing Ubiquitous computing resources
IGE105 – Communication Technology in a Changing World
Communication Technology in a Changing World
Advantages & Disadvantages
Done by:Thikra abdullah
Presentation transcript:

“Machines that fit the human environment, instead of forcing humans to enter theirs, will make using a computer as refreshing as taking a walk in the woods.” -- Mark Weiser The Computer for the 21st Century

Calm Computing Hari Khalsa September 20, 2004

The Coming Age of Calm Technology  What has come before  Mainframe - many people share one computer  PC - one person, one computer  Internet - transition to ubiquitous computing  Calm Technology  Utilize a user’s periphery  Come to center only when necessary  Enhance peripheral reach to keep people tuned in to surroundings without demanding attention  Examples  Inner office windows connect people to nearby world  Dangling string connects people to network usage  But why? By Mark Weiser and John Seely Brown, 1996

Unremarkable Computing  Making technology “invisible in use”  Routines  Done in the doing  Knocking on the door has a specific meaning at a specific time  Perceptual visibility and practical invisibility  Alarm clock going off at a specific time starts a routine  Clock has practical invisibility since no one thinks about the clock itself  Do not command attention unless necessary  Routines are calm and generally unspoken  Problems with current approaches  Perceptual invisibility vs. invisibility in use  Augmenting and adding semantics to tangible artifacts can confuse  Systems intended to support a routine must not ask the user to describe or account for activities  Need more research to create actual designs By Peter Tolmie, James Pycock, Tim Diggins, Allan MacLean and Alain Karsenty, 2002

Seeing the Invisible  Invisibility in Use  Fades into the conceptual background  Work through tools rather than with them  Example: computer mouse  Often arises from learning and practice  Infrastructural Invisibility  Computation is embedded in environment  Ability of infrastructure to become tacit in thought and action  Interaction is less apparent  Example: plumbing and electrical systems  Invisibility is an experienced relationship between humans and their tools, whether physical or conceptual By Jeffrey Heer, Peter Khooshabeh

Calm vs. Invisible  Invisibility  Invisibility In use  Infrastructural / Perceptual Invisibility  “Calm” computing fits into both  Challenge: making ubiquitous computing calm  Systems that “encalm and inform” simultaneously

Questions and Discussion