7
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. “Machines that fit the human environment, instead of forcing humans to enter theirs, will make using a computer as refreshing as taking a walk in the woods.” -- Mark Weiser The Computer for the 21st Century

Calm Computing

  • Upload
    maia

  • View
    44

  • Download
    0

Embed Size (px)

DESCRIPTION

“Machines that fit the human environment, instead of forcing humans to enter theirs, will make using a computer as refreshing as taking a walk in the woods.” -- Mark Weiser The Computer for the 21st Century. Calm Computing. Hari Khalsa September 20, 2004. The Coming Age of Calm Technology. - PowerPoint PPT Presentation

Citation preview

Page 1: Calm Computing

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

“Machines that fit the human environment, instead of forcing humans to enter theirs, will make using a computer as refreshing as taking a walk in the woods.”

-- Mark WeiserThe Computer for the 21st Century

Page 2: Calm Computing

Calm ComputingCalm ComputingHari KhalsaHari Khalsa

September 20, 2004September 20, 2004

Page 3: Calm Computing

The Coming Age of Calm The Coming Age of Calm TechnologyTechnology

What has come beforeWhat has come before Mainframe - many people share one computerMainframe - many people share one computer PC - one person, one computerPC - one person, one computer Internet - transition to ubiquitous computingInternet - transition to ubiquitous computing

Calm TechnologyCalm Technology Utilize a user’s peripheryUtilize a user’s periphery Come to center only when necessaryCome to center only when necessary Enhance peripheral reach to keep people tuned in to Enhance peripheral reach to keep people tuned in to

surroundings without demanding attentionsurroundings without demanding attention

ExamplesExamples Inner office windows connect people to nearby worldInner office windows connect people to nearby world Dangling string connects people to network usageDangling string connects people to network usage

But why?But why?

By Mark Weiser and John Seely Brown, 1996

Page 4: Calm Computing

Unremarkable ComputingUnremarkable Computing

Making technology “invisible in use”Making technology “invisible in use” RoutinesRoutines

Done in the doingDone in the doing Knocking on the door has a specific meaning at a specific timeKnocking on the door has a specific meaning at a specific time

Perceptual visibility and practical invisibilityPerceptual visibility and practical invisibility Alarm clock going off at a specific time starts a routineAlarm clock going off at a specific time starts a routine Clock has practical invisibility since no one thinks about the clock itselfClock has practical invisibility since no one thinks about the clock itself

Do not command attention unless necessaryDo not command attention unless necessary Routines are calm and generally unspokenRoutines are calm and generally unspoken

Problems with current approachesProblems with current approaches Perceptual invisibility vs. invisibility in usePerceptual invisibility vs. invisibility in use Augmenting and adding semantics to tangible artifacts can confuseAugmenting and adding semantics to tangible artifacts can confuse Systems intended to support a routine must not ask the user to describe or Systems intended to support a routine must not ask the user to describe or

account for activitiesaccount for activities

Need more research to create actual designsNeed more research to create actual designs

By Peter Tolmie, James Pycock, Tim Diggins, Allan MacLean and Alain Karsenty, 2002

Page 5: Calm Computing

Seeing the InvisibleSeeing the Invisible

Invisibility in UseInvisibility in Use Fades into the conceptual backgroundFades into the conceptual background Work Work throughthrough tools rather than tools rather than withwith them them

Example: computer mouseExample: computer mouse Often arises from learning and practiceOften arises from learning and practice

Infrastructural InvisibilityInfrastructural Invisibility Computation is embedded in environmentComputation is embedded in environment Ability of infrastructure to become tacit in thought and actionAbility of infrastructure to become tacit in thought and action Interaction is less apparentInteraction is less apparent Example: plumbing and electrical systemsExample: plumbing and electrical systems

Invisibility is an experienced relationship between Invisibility is an experienced relationship between humans and their tools, whether physical or conceptualhumans and their tools, whether physical or conceptual

By Jeffrey Heer, Peter Khooshabeh

Page 6: Calm Computing

Calm vs. InvisibleCalm vs. Invisible

Invisibility Invisibility Invisibility In useInvisibility In use Infrastructural / Perceptual InvisibilityInfrastructural / Perceptual Invisibility

““Calm” computing fits into bothCalm” computing fits into both

Challenge: making ubiquitous computing calmChallenge: making ubiquitous computing calm Systems that “encalm and inform” simultaneouslySystems that “encalm and inform” simultaneously

Page 7: Calm Computing

Questions and DiscussionQuestions and Discussion