INVISIBLE COMPUTING

Mega-Utilities Drive Invisible Technologies

For example, Microsoft’s Smart Personal Object Technology (SPOT)enabled wristwatch can receive messages, calendar updates, and customized news, sports, and other data over one-way FM radio signals and display this information on its LCD face. Before long, wristwatch cartoons may be designed, swapped, and downloaded like cell phone ring tones.

Bill N. Schilit, Intel Research

The emerging IEEE 802.11b (Wi-Fi) wireless standard demonstrates another rapidly growing utility: wireless con-

A

decade ago, while managing the Computer Science Laboratory at Xerox Palo Alto Research Center, Mark Weiser envisioned a computer “so imbedded, so fitting, so natural, that we use it without even thinking about it” (“Creating the Invisible Interface,” Proc. 7th Ann. ACM Symp. User Interface Software and Technology, ACM Press, 1994, p. 1). Today, Weiser’s vision is coming to pass everywhere: game phones, personal video recorders, digital cameras, sensor networks, automotive telematics, and more. Despite their apparent simplicity, invisible technologies represent the pinnacle of engineering accomplishments in digital design, networking, user interfaces, and machine learning as well as in the social science disciplines of psychology and anthropology. It takes a lot of science to move technology from the foreground to the background. This new bimonthly column will focus on leading-edge science that is inspiring the next generation of pervasive computing. Researchers at university and industry labs around the world will explain their work in intelligent user interfaces, interoperability, sensor networks, smart environments, and novel applications. In addition, the column will highlight the emerging area of proactive systems that come from the background to help people at the right time.

Megabits per second

As computers fade into the background, emerging technologies bring new challenges as well as benefits. MEGA-UTILITIES Computers are becoming pervasive in part because megahertz, megabits per second, and megabytes have become utilities much like water, gas, and electricity.

Megahertz In 1965, when Gordon Moore articulated his law that chip density would double every 18 months, the notion of a megahertz utility wasn’t so obvious. In that year he wrote: “Integrated circuits will lead to such wonders as home computers—or at least terminals connected to a central computer—automatic controls for automobiles, and personal portable communications equipment. The electronic wristwatch needs only a display to be feasible today.” (www.intel. com/research/silicon/moorespaper.pdf) Nearly 40 years later, the accuracy of Moore’s predictions are evident in the way today’s high-speed integrated circuits are transforming everyday objects including wristwatches, phones and pens, into platforms for invisible computing.

nectivity. For example, because Intel is making 802.11a/b connectivity a basic function of its new Centrino chipset, every laptop shipped in the near future will have built-in wireless communications capability. Many Starbucks regulars are aware that in some of its US stores, the chain is serving up wireless connectivity along with gourmet coffee, but this only hints at what’s to come. IBM, Intel, and AT&T announced last December that they are jointly establishing a new company, Cometa Networks, that plans to offer a single sign-on, single authentication, and seamless-roaming nationwide network in the 50 largest US cities. Wi-Fi connectivity facilitates digital interaction with the physical world, especially when combined with location information via the Global Positioning System. Services such as go2online.com and Sweden’s Telia let mobile users search for nearby movies, restaurants, and stores. Shared electronic displays such as the Love Board at a busy intersection in Tokyo’s trendy Shibuya disFebruary 2003

97

Invisible Computing

OBSER VATION ROOM

“I forgot what pill to take.”

“Your blo pressure od Take 1 is ok. diuretic .”

ERV ATIO N

RO O

M

“This mole ha s chan You should co ged. ntact your doctor.”

OBS

Patien t-cont rolle d da ta re le as e

“Excuse me, your cut may be infected. Please check the advisor for details.”

M

ed

Physicians’ offices Visiting nurse services Caregivers ic a Medical databases l in form a ti o n a n d in s t r u c ti o n s

Figure 1. Smart home. The University of Rochester’s Center for Future Health is developing invisible and proactive computing elements that let elderly people live independently in smart homes instead of having to move to care facilities.

trict let passersby send photos and text messages from their i-mode phones and PCs to a building-mounted Jumbotron for public viewing. The potential ubiquity of wireless technology is so great that many believe it should be a public service. The Community Node Wireless Database Project (nodedb.com) lists more than 3,800 public-access Wi-Fi connection points around the world. In what could become a trend, the City of Long Beach, California, is planning to make free wireless Internet access available downtown to help attract visitors. How far will this integration of the electronic and the real world go? If researchers such as Deborah Estrin at the University of California, Los Angeles, are right, the Earth will soon be covered by a mesh of wireless sensors connected in an ad hoc network, providing the ultimate link between people and their environment. 98

Computer

Megabytes Mass storage has emerged as yet another mega-utility. In the 1980s, a hard disk for my Macintosh cost US$100 per megabyte; last month, I paid the same amount for 100 gigabytes—100,000 times as much memory—to upgrade my digital video recorder’s hard disk. Mass storage has become pervasive in consumer electronics, with digital cameras, USB dongles, PDAs, MP3 players, and some cell phones having megabytes of flash memory. The megastorage trend is transforming computers from processors of compact, computer-friendly ASCII data to processors of memory-intensive, people-friendly video, image, and audio data. In part, it is the ubiquitous availability of such data that is letting computers blend into the background of day-to-day life. The rapid increase in storage capac-

ity is prompting researchers to think about how to manage it. For example, Boon Loo of the University of California, Berkeley, and Intel’s Anthony LaMarca have developed middleware that lets cameras, PDAs, cell phones, and other portable devices automatically replicate one another’s data, creating transparent backups. LaMarca believes that, in the future, small pervasive devices will run the same sort of distributed and replicated storage schemes usually found in back-end server rooms.

INTERACTING WITH THE INVISIBLE As computer technology fades from view, managing the complexities of human-machine interaction will become increasingly important. At the University of Washington, Oren Etzioni is investigating how to combine sensed context—for example, from a home’s sensor network—with machine learn-

ing to resolve the ambiguity in natural language processing. It’s not uncommon for a computer equipped with voice recognition software to misinterpret a query such as “Do I have any messages today?” to be “Do I have my massage today?” By using the context of when and where the question is asked, recognition systems can more accurately choose among alternate interpretations. Enhancing natural language recognition in this and other ways may ultimately let us have reasonably intelligent “conversations” with telephone answering machines as well as home entertainment systems and a multitude of other intricate appliances. Clearly we don’t want to interact, in the conventional sense, with the fabric of the digital world—we can all imag-

ine the terrifying prospect of pop-up dialog boxes and relentlessly dumb digital characters following us wherever we go. Rather, computers should anticipate our needs and sometimes act on our behalf. Researchers at the Georgia Institute of Technology and the University of Rochester are building smart homes that have the ability to anticipate users’ needs. For example, a medicine cabinet in Rochester’s smart home, shown in Figure 1, might inform residents that the antacid they are planning to take interacts badly with heart medication they took earlier in the day. Such proactivity is extremely difficult to achieve, but applying techniques from machine learning—which will improve how systems serve us over time—and data mining—which will

BOARD OF GOVERNORS Term Expiring 2003: Fiorenza C. Albert-Howard, Manfred Broy, Alan Clements, Richard A. Kemmerer, Susan A. Mengel, James W. Moore, Christina M. Schober Term Expiring 2004: Jean M. Bacon, Ricardo Baeza-Yates, Deborah M. Cooper, George V. Cybenko, Haruhisha Ichikawa, Lowell G. Johnson, Thomas W. Williams Term Expiring 2005: Oscar N. Garcia, Mark A Grant, Michel Israel, Stephen B. Seidman, Kathleen M. Swigger, Makoto Takizawa, Michael R. Williams Next Board Meeting: 22 Feb. 2003, San Diego, CA

IEEE OFFICERS President: MICHAEL S. ADLER President-Elect: ARTHUR W. WINSTON Past President: RAYMOND D. FINDLAY Executive Director: DANIEL J. SENESE Secretary: LEVENT ONURAL Treasurer: PEDRO A. RAY VP, Educational Activities: JAMES M. TIEN VP, Publications Activities:MICHAEL R. LIGHTNER VP, Regional Activities: W. CLEON ANDERSON VP, Standards Association: GERALD H. PETERSON VP, Technical Activities: RALPH W. WYNDRUM JR. IEEE Division VIII Director JAMES D. ISAAK President, IEEE-USA: JAMES V. LEONARD

visible computing offers many possible benefits, but without vision and foresight it also has the potential to turn our world into a haunted house filled with digital horrors. The challenge is to make these emerging technologies proactive while leaving users serene and in control. As we explore technical developments in invisible computing as well as its social implications, I welcome your contributions to this column in future editions of Computer. ■

I

Bill N. Schilit is codirector of Intel Research Seattle. Contact him at [email protected]. EXECUTIVE COMMITTEE

PURPOSE The IEEE Computer Society is the world’s largest association of computing professionals, and is the leading provider of technical information in the field. MEMBERSHIP Members receive the monthly magazine COM PUTER, discounts, and opportunities to serve (all activities are led by volunteer members). Membership is open to all IEEE members, affiliate society members, and others interested in the computer field. COMPUTER SOCIETY WEB SITE The IEEE Computer Society’s Web site, at http://computer.org, offers information and samples from the society’s publications and conferences, as well as a broad range of information about technical committees, standards, student activities, and more.

provide systems with multiple examples to use for decisions—shows promise.

President: STEPHEN L. DIAMOND* Picosoft, Inc. P.O.Box 5032 San Mateo, CA 94402 Phone: +1 650 570 6060 Fax: +1 650 345 1254 [email protected]

COMPUTER SOCIETY OFFICES Headquarters Office 1730 Massachusetts Ave. NW Washington, DC 20036-1992 Phone: +1 202 371 0101 • Fax: +1 202 728 9614 E-mail: [email protected] Publications Office 10662 Los Vaqueros Cir., PO Box 3014 Los Alamitos, CA 90720-1314 Phone:+1 714 821 8380 E-mail: [email protected] Membership and Publication Orders: Phone: +1 800 272 6657 Fax: +1 714 821 4641 E-mail: [email protected] Asia/Pacific Office Watanabe Building 1-4-2 Minami-Aoyama,Minato-ku, Tokyo107-0062, Japan Phone: +81 3 3408 3118 • Fax: +81 3 3408 3553 E-mail: [email protected]

President-Elect: CARL K. CHANG* Past President: WILLIS. K. KING* VP, Educational Activities: DEBORAH K. SCHERRER (1ST VP)* VP, Conferences and Tutorials: CHRISTINA SCHOBER* VP, Chapters Activities: MURALI VARANASI† VP, Publications: RANGACHAR KASTURI † VP, Standards Activities: JAMES W. MOORE† VP, Technical Activities: YERVANT ZORIAN† Secretary: OSCAR N. GARCIA* Treasurer:WOLFGANG K. GILOI* (2ND VP) 2002–2003 IEEE Division VIII Director: JAMES D. ISAAK† 2003–2004 IEEE Division V Director: GUYLAINE M. POLLOCK† Computer Editor in Chief: DORIS L. CARVER† Executive Director: DAVID W. HENNAGE† * voting member of the Board of Governors † nonvoting member of the Board of Governors

EXECUTIVE STAFF Executive Director: DAVID W. HENNAGE Assoc. Executive Director: ANNE MARIE KELLY Publisher: ANGELA BURGESS Assistant Publisher: DICK PRICE Director, Administration: VIOLET S. DOAN Director, Information Technology & Services: ROBERT CARE Manager, Research & Planning: JOHN C. KEATON

Mega-Utilities Drive Invisible Technologies

phones, personal video recorders, digi- tal cameras, sensor ... like cell phone ring tones. Megabits per ... the University of California, Los. Angeles, are right, the ...

438KB Sizes 1 Downloads 154 Views

Recommend Documents

Mega-utilities drive invisible technologies - Computer
(“Creating the Invisible Interface,”. Proc. 7th Ann. ACM ... is coming to pass everywhere: game phones, personal video .... server rooms. INTERACTING WITH ...

Invisible Marketing.pdf
Sign in. Loading… Page 1. Whoops! There was a problem loading more pages. Retrying... Invisible Marketing.pdf. Invisible Marketing.pdf. Open. Extract.

Net-Technologies-May201412 .NET TECHNOLOGIES(USING ASP ...
Net-Technologies-May201412 .NET TECHNOLOGIES(USING ASP.NET).pdf. Net-Technologies-May201412 .NET TECHNOLOGIES(USING ASP.NET).pdf.

Net-Technologies-Dec201311 NET TECHNOLOGIES (USING ASP ...
Net-Technologies-Dec201311 NET TECHNOLOGIES (USING ASP.NET).pdf. Net-Technologies-Dec201311 NET TECHNOLOGIES (USING ASP.NET).pdf. Open.

chuck palahniuk invisible monsters pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. chuck palahniuk ...

TKS TECHNOLOGIES
Nov 13, 2017 - งบ 3Q60 ทรงตัว YoY จำกลูกกตัญญูอีกครั้ง. ก ำไรสุทธิ 3Q60 อยู่ที่89 ล้ำนบำท (+20.9% QoQ, +0.3% YoY) ก ำไรที่ฟื้น

HCL TECHNOLOGIES LTD.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. HCL TECHNOLOGIES LTD.pdf. HCL TECHNOLOGIES LTD.pdf.

The Invisible Boy Activity Preview.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. The Invisible ...

invisible resistance to tyranny.pdf
invisible resistance to tyranny.pdf. invisible resistance to tyranny.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying invisible resistance to tyranny.pdf.

L-Homme-Invisible-French-Edition.pdf
créanciers (loyer non payé pour cause de manque d'argent et accusé de vivisection sur le chat de sa voisine; ce qui est faux). Il. devient alors totalement ...

The Invisible Man - H.G.Wells.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. The Invisible ...

The Invisible Man
to see that her visitor still wore his hat and coat, standing with his back to her and ..... time; there was Mrs. Hall saying his dog didn't have no business to bite her guests; ..... scream of alarm, succeeded in getting her downstairs, and applying

big-data-cloud-technologies-brief.pdf
big-data-cloud-technologies-brief.pdf. big-data-cloud-technologies-brief.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying ...

advanced internet technologies pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. advanced internet technologies pdf. advanced internet technologies pdf. Open. Extract. Open with. Sign In. M

Maxtherm Technologies Private Limited.pdf
Ambattur Assessment Circle. No.5, High Court Colony. Chennai 600 049. ... Page 3 of 6. Main menu. Displaying Maxtherm Technologies Private Limited.pdf.

industrial technologies
Custom Software. Project Engineering. Training. Maintenance. APEX IT, LLC began in 1998 as part of an Industrial Systems ... Photoshop. Visio. C, C #, C ++.

propulsion technologies -
Propulsion Technologies major IPT Training programs for CSE/IT. /ECE /EEE departments include,. • IPT on Android and Mobile Application Development.

tks technologies - Settrade
Dec 14, 2017 - ประกาศเพิ่มทุน RO เพื่อเข้าซื้อ TBSP ที่ 15.70 บาท. TKS ประกาศเพิ่มทุนสัดส่วน 6.0034 หุ้นเดิมต่อ 1 หุ

how Social Technologies Drive - Kantar Millward Brown
May 15, 2012 - Today, however, the tools that make it easy to connect and work together online are starting to disrupt traditional working practices in ways that we are only just beginning to realise. There is a growing recognition that rather than b