New From the Editor-in-Chief . . . BEING INTERACTIVE Beyond … · 2000. 10. 9. · Helmuth Ritzer...

2
As the Internet extends its reach, peo- ple want to do more and more with gadgets attached to it: check e-mail messages from the airport, monitor home security systems, and set room temperatures on the way home from work. The motivation is natural: you want to keep in touch—and in con- trol —from wherever you are. And who hasn’t had a nagging feeling, after leaving on a long trip, of having left a back door open or the stove on? Systems that support these kinds of functionality are starting to emerge. For instance, the first products using Bluetooth wireless technology are scheduled for market next year (http://www.blue- tooth.com). However, current prototypes and prod- uct visions seem quite ad hoc. Applications are essen- tially modeled in a disjointed manner that loses the natural connections among them. User interfaces tend to be superficial, and changing locations is about the only subtlety underlying design ideas. The common theme among these upcoming applications is “action at a distance.” Let me propose a simple idea for modeling this theme computation- ally, so that where an action originates and where the action occurs can be related systematically. Spacing Out Let’s begin with some basic assumptions. We are given a world—a rich world populated with users and devices and humming with activity. Let’s refer to a portion of the world, including its users and devices, as a space. Important characteristics of a space are the kinds of devices associated with it and the quality of its network connection. Thanks to devices and connectivity, users can observe (and control) spaces from other spaces. Let’s refer to the placing of spaces in the world as embedding. Each space has its own embedding, which reveals some interesting aspects of the space. What makes spaces interesting is that they can be based on more than just geography. When the space is based on a location, the embedding may tell us its geographical coordinates and also facts pertaining to the location. For example, in the home location, the facts would be about the security system, temperature settings, and whether a back door is open. When the space is based on an interaction—say, a dialog or e-mail exchange—the embedding gives us the user’s progress in it. When the space is based on an ongoing activity, the embedding tells us things like the name and description of the activity, how far along the user is in it, and what the user plans to do. What a user sees depends not only on the space he or she observes, but also on the space from which he or she observes. Let’s refer to the view of a space from a space as a representation. Essentially the representing space is a window into the world and filters out some details of the viewed spaces. For example, using a home location embedding, you might be able to call in to set your room tempera- ture, but not to disable the security system. Spaces Computationally An embedding of a space governs how much of it can be observed or controlled from elsewhere. Embeddings are based on the devices that exist in a space and how they are accessed. Think of embed- dings as computational capabilities. Likewise, a repre- sentation governs how much of an embedding can be observed or controlled from the user’s current space. Think of representations as computational authorizations . Representations are based on the devices that exist in a space and how their credentials are set up. Pass the given portion of the world through an embedding-representation path to com- pute what the user can see and control. When you can represent a space which itself repre- 6 SEPTEMBER • OCTOBER 2000 http://computer.org/internet/ IEEE INTERNET COMPUTING From the Editor-in-Chief . . . Beyond Geography Munindar P. Singh • [email protected] BEING INTERACTIVE An embedding of a space governs how much of it can be observed or controlled from elsewhere.

Transcript of New From the Editor-in-Chief . . . BEING INTERACTIVE Beyond … · 2000. 10. 9. · Helmuth Ritzer...

  • As the Internet extends its reach, peo-ple want to do more and more withgadgets attached to it: check e-mailmessages from the airport, monitorhome security systems, and set roomtemperatures on the way home fromwork. The motivation is natural: youwant to keep in touch—and in con-trol—from wherever you are. Andwho hasn’t had a nagging feeling, afterleaving on a long trip, of having left aback door open or the stove on?

    Systems that support these kinds offunctionality are starting to emerge. For instance, thefirst products using Bluetooth wireless technology arescheduled for market next year (http://www.blue-tooth.com). However, current prototypes and prod-uct visions seem quite ad hoc. Applications are essen-tially modeled in a disjointed manner that loses thenatural connections among them. User interfacestend to be superficial, and changing locations isabout the only subtlety underlying design ideas.

    The common theme among these upcomingapplications is “action at a distance.” Let me proposea simple idea for modeling this theme computation-ally, so that where an action originates and where theaction occurs can be related systematically.

    Spacing OutLet’s begin with some basic assumptions. We aregiven a world—a rich world populated with usersand devices and humming with activity. Let’s refer toa portion of the world, including its users anddevices, as a space. Important characteristics of aspace are the kinds of devices associated with it and

    the quality of its network connection.Thanks to devices and connectivity,users can observe (and control) spacesfrom other spaces.

    Let’s refer to the placing of spacesin the world as embedding. Each spacehas its own embedding, which revealssome interesting aspects of the space.What makes spaces interesting is thatthey can be based on more than justgeography. When the space is basedon a location, the embedding may tellus its geographical coordinates and

    also facts pertaining to the location. For example, inthe home location, the facts would be about thesecurity system, temperature settings, and whether aback door is open. When the space is based on aninteraction—say, a dialog or e-mail exchange—theembedding gives us the user’s progress in it. Whenthe space is based on an ongoing activity, theembedding tells us things like the name anddescription of the activity, how far along the user isin it, and what the user plans to do.

    What a user sees depends not only on the spacehe or she observes, but also on the space fromwhich he or she observes. Let’s refer to the view of aspace from a space as a representation. Essentially therepresenting space is a window into the world andfilters out some details of the viewed spaces. Forexample, using a home location embedding, youmight be able to call in to set your room tempera-ture, but not to disable the security system.

    Spaces ComputationallyAn embedding of a space governs how much of itcan be observed or controlled from elsewhere.Embeddings are based on the devices that exist in aspace and how they are accessed. Think of embed-dings as computational capabilities. Likewise, a repre-sentation governs how much of an embedding canbe observed or controlled from the user’s currentspace. Think of representations as computationalauthorizations. Representations are based on thedevices that exist in a space and how their credentialsare set up. Pass the given portion of the worldthrough an embedding-representation path to com-pute what the user can see and control.

    When you can represent a space which itself repre-

    6 SEPTEMBER • OCTOBER 2000 ht tp://computer.org/internet/ IEEE INTERNET COMPUTING

    From the Editor-in-Chief . . .

    Beyond GeographyMunindar P. Singh • [email protected]

    BEI

    NG

    INTE

    RA

    CTIV

    E

    An embedding of a spacegoverns how much of it

    can be observed or controlledfrom elsewhere.

  • sents a space, you effectively tunnel through one space toget to another. From my workstation, I can view all labfiles and read my e-mail. From my home computer, Ican’t do either directly. But when I telnet to my worksta-tion, I can view all lab files and read my e-mail, effective-ly acquiring the authorizations of my office space.Tunneling helps us hack around the limitations of howthe authorizations and capabilities are set up. Tunnelingis a cheap way to achieve application integration. But it isnot always desirable. For example, in the near future, Imight leave my e-wallet on a server, change its settingsfrom my desktop (wider authorizations), and use it foronly small purchases from my phone (limited authoriza-tions). Of course, tunneling from the phone to the servervia the desktop would be a security risk, not to mentionconfusing to the user. Thus, tunneling may sometimesbe essential, but would often not be desirable. However,minimizing tunneling presupposes a clean applicationdesign that includes precisely the embeddings and repre-sentations that users need.

    HabitationThe space metaphor provides a useful way to partitionthe design requirements of applications where users arefundamentally acting at a distance. Partitioning helps usbuild applications that keep track of where a user is. Andwhere a user is is not just a question of geography. �

    7IEEE INTERNET COMPUTING

    IEEE INTERNET COMPUTING

    IEEE Computer Society Publications Office10662 Los Vaqueros Circle, PO Box 3014

    Los Alamitos, CA 90720-1314

    EDITOR-IN-CHIEF

    Munindar P. Singh • [email protected]

    ASSOCIATE EDITOR-IN-CHIEF

    Robert Filman • [email protected]

    EDITORIAL BOARD

    Salah Aidarous • [email protected](IEEE Communications Society Liaison)

    Miroslav Benda • [email protected]

    Scott Bradner • [email protected]

    Fred Douglis • [email protected](Liaison to IEEE CS Technical Committee on the Internet)

    Stuart I. Feldman • [email protected]

    Li Gong • [email protected]

    Seif Haridi • [email protected]

    Michael N. Huhns • [email protected]

    Ray W. Johnson • [email protected]

    Gail E. Kaiser • [email protected]

    Leonard Kleinrock • [email protected]

    Doug Lea • [email protected]

    Frank Maurer • [email protected]

    Charles E. Perkins • [email protected]

    Charles J. Petrie • [email protected](EIC emeritus)

    Agostino Poggi • [email protected]

    William Regli • [email protected]

    Helmuth Ritzer • [email protected]

    Anthony Michael Rutkowski • [email protected]

    Ravi Sandhu • [email protected]

    Brian Thomas • [email protected]

    STAFF

    Managing Editor: Linda [email protected]

    Associate Editor: Joan [email protected]

    Staff Editor/IC Online Design: Steve [email protected]

    Magazine Assistant: Hazel [email protected]

    Art Director: Joseph Daigle

    Cover Design: Joseph Daigle

    Graphic Artist: Ken Duckworth

    Contributing Editors: David Clark, Keri Schreiner, Martin Zacks

    Publisher: Angela Burgess

    Membership/Circulation Marketing Manager: Georgann Carter

    Advertising Supervisor: Marian Anderson

    CS MAGAZINE OPERATIONS COMMITTEE

    Sorel Reisman (Chair), William Everett (Vice Chair),James H. Aylor, Jean Bacon, Wushow Chou,

    George Cybenko, William I. Grosky, Steve McConnell, Daniel E. O’Leary, Ken Sakamura, Munindar P. Singh, James J. Thomas, Michael R. Williams, Yervant Zorian

    CS PUBLICATIONS BOARD

    Sallie Sheppard (Chair), Jake Aggarwal, Laxmi Bhuyan, Jon Butler, Lori Clarke, Alberto del Bimbo, Laurel Kaleda,

    Rangachar Kasturi, Mike T. Liu, Sorrel Reisman, Mike Williams, Zhiwei Xu

    computer.org/e-News

    Available FREEto members.

    Good news for your in-box.

    Be alerted to• articles and special issues

    • conference news• submission and

    registrationdeadlines

    • interactive forums

    Sign Up Today forthe IEEEComputerSociety’se-News

    Sign Up Today forthe IEEEComputerSociety’se-News