Vision and Reality of Hypertext and Graphical User Interfaces

Total Page:16

File Type:pdf, Size:1020Kb

Vision and Reality of Hypertext and Graphical User Interfaces Universität Hamburg Fachbereich Informatik Vogt-Kölln-Str. 30 D-22527 Hamburg Germany Bericht 237 Vision and Reality of Hypertext and Graphical User Interfaces FBI-HH-B-237/02 Matthias Müller-Prove [email protected] In die Reihe der Berichte des Fachbereichs Informatik aufgenommen durch Prof. Dr. Horst Oberquelle Prof. Dr. Christopher Habel Februar 2002 Abstract The World Wide Web took off ten years ago. Its tremendous success makes it easy to forget the more than forty years of hypertext development that preceded the Web. Similarly, modern graphical user interfaces have drawn attention away from the many compelling ideas behind earlier user interface designs. In the present thesis, numerous early hypertext and graphical user interface systems are presented and contrasted with today's Web and desktop interfaces. The designers of early hypertext and graphical user interface systems shared a common objective: the development of a personal dynamic medium for creative thought. Not very much is left from this original vision. Retrospect reveals promising insights that might help to reconcile the desktop environment with the Web in order to design a consistent and powerful way to interact with the computer. Zusammenfassung Das World Wide Web hat vor nunmehr über zehn Jahren seinen unvergleichlichen Siegeszug begonnen. Dabei wird oft übersehen, daß die Idee des Hypertexts eine bereits über vierzigjährige Geschichte hinter sich hat. Die Arbeit zeigt diese Entwicklung anhand der verschiedenen Hypertextsysteme auf und kontrastiert sie mit dem Web. Die Betrachtung der Grafischen Benutzungsoberflächen zeigt ganz ähnlich, daß auch hier viele gute Ideen auf dem Wege zu den heute dominierenden Fenstersystemen verloren gegangen sind. Von der gemeinsamen Idee von Hypertext und Graphischer Benutzungsschnittstelle, nämlich die Schaffung eines persönlichen Mediums zum kreativen Umgang mit dem Computer, ist heute nur noch wenig übrig. Durch Rückschau gewinnt diese Arbeit mögliche Ansätze, die dazu beitragen können, die Interface-Welten des Webs mit denen der Desktop-Oberfläche zu verbinden. für Lelle† Betreuer: Prof. Dr. Horst Oberquelle Arbeitsbereich Angewandte und Sozialorientierte Informatik (ASI) Universität Hamburg, Fachbereich Informatik Prof. Dr. Christopher Habel Arbeitsbereich Wissens- und Sprachverarbeitung (WSV) Universität Hamburg, Fachbereich Informatik Contents Preface . vii 1 Introduction . 1 2 Hypertext . 5 2.1 History . 5 2.1.1 Memex . 12 2.1.2 Xanadu . 14 2.1.3 NLS/Augment . 16 2.1.4 HES and FRESS . 18 2.1.5 FLEX and Smalltalk . 19 2.1.6 NoteCards . 21 2.1.7 Symbolics Document Examiner & Concordia . 23 2.1.8 Hyperties . 26 2.1.9 Guide . 26 2.1.10 HyperCard . 27 2.1.11 Storyspace . 28 2.1.12 Intermedia . 29 2.1.13 Microcosm . 30 2.1.14 World Wide Web . 32 2.1.15 Hyper-G/HyperWave . 34 2.2 Theory of Hypertext . 38 2.2.1 Hypertext Feature Matrix . 38 2.2.2 The Dexter Hypertext Reference Model . 40 2.2.3 Open Hypermedia Systems . 43 2.3 Provisions for the Future of the World Wide Web . 44 2.3.1 Identification of Nodes . 44 2.3.2 Groups of Nodes . 45 2.3.3 General Hyperlinks . 45 2.3.4 Browser . 45 2.3.5 Integrated Browser/Editor Environment . 46 2.3.6 Separation between Content and Appearance . 47 2.3.7 Integration of Hypertext facilities into the Operating System . 48 3 Graphical User Interfaces . 49 3.1 History . 49 3.1.1 Man-Computer Symbiosis . 53 3.1.2 Sketchpad . 54 3.1.3 NLS/Augment . 56 3.1.4 Flex Machine and Dynabook . 59 3.1.5 Xerox Alto, the Interim Dynabook and Smalltalk . 62 3.1.6 Xerox Star . 65 VI 3.1.7 Spatial Data Management System . 67 3.1.8 Apple Lisa . 70 3.1.9 Apple Macintosh . 74 3.2 Human Factors . 77 3.2.1 Fitts’ Law . 77 3.2.2 Three Stages of Human Development . 78 3.2.3 Interactivity . 80 3.3 Windows, Icons, Menus, and Pointing Device . 81 3.3.1 Windows . 81 3.3.2 Icons . 83 3.3.3 Menus . 83 3.3.4 The Mouse and other Graphical Input Devices . 84 3.4 Provisions for the Future of the Desktop Model . 86 3.4.1 Filing . 87 3.4.2 Document-Centered Design . 89 3.4.3 User Illusion . 90 4 Beyond the Desktop . 91 4.1 Web GUI meets Desktop GUI . 91 4.2 Provisions for the Future . 93 5 Synopsis . 97 APPENDIX . 99 Acronyms . 100 Software . 102 Credits to Figures . 104 References . 107 Preface You are about to read my master thesis. If you are also interested to follow the trails of my voyage of discovery in the World Wide Web you are invited to start at the URL: http://www.mprove.de/diplom/ I would like to thank Horst Oberquelle and Christopher Habel at the Computer Science Department of the University of Hamburg. The following people have supported my work with valuable comments and copies of hard to retrieve articles: Rolf Schulmeister at the Interdisciplinary Center for Higher Education, University of Hamburg; Michael Friedewald at the Fraunhofer-Institut für Systemtechnik und Innovationsforschung; Ulrich Klotz at the Hochschule für Gestal- tung, Fachbereich Produktgestaltung in Offenbach am Main; and Hartmut Obendorf at the Arbeitsbereich Angewandte und Sozialorientierte Informatik, Computer Science Department of the University of Hamburg. I am much obliged to Alan Kay and Jeff Johnson. Their e-mails helped to shape my understanding of the work at Xerox PARC. My special thanks go to my American colleagues and friends Irv Kanode and Chris Dryer who have read the manuscript and made essential contributions to content and style. VIII 1 Introduction Research and development of computer systems have always been.
Recommended publications
  • The Origins of the Underline As Visual Representation of the Hyperlink on the Web: a Case Study in Skeuomorphism
    The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Romano, John J. 2016. The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:33797379 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA The Origins of the Underline as Visual Representation of the Hyperlink on the Web: A Case Study in Skeuomorphism John J Romano A Thesis in the Field of Visual Arts for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2016 Abstract This thesis investigates the process by which the underline came to be used as the default signifier of hyperlinks on the World Wide Web. Created in 1990 by Tim Berners- Lee, the web quickly became the most used hypertext system in the world, and most browsers default to indicating hyperlinks with an underline. To answer the question of why the underline was chosen over competing demarcation techniques, the thesis applies the methods of history of technology and sociology of technology. Before the invention of the web, the underline–also known as the vinculum–was used in many contexts in writing systems; collecting entities together to form a whole and ascribing additional meaning to the content.
    [Show full text]
  • Towards a Secure Agent Society
    Towards A Secure Agent So ciety Qi He Katia Sycara The Rob otics Institute The Rob otics Institute Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. Pittsburgh, PA 15213, U.S.A [email protected] [email protected] March 23, 1998 Abstract We present a general view of what a \secure agent so ciety" should b e and howtode- velop it rather than fo cus on any sp eci c details or particular agent-based application . We b elieve that the main e ort to achieve security in agent so cieties consists of the following three asp ects:1 agent authentication mechanisms that form the secure so ciety's foundation, 2 a security architecture design within an agent that enables security p olicy making, se- curity proto col generation and security op eration execution, and 3 the extension of agent communication languages for agent secure communication and trust management. In this pap er, all of the three main asp ects are systematically discussed for agent security based on an overall understanding of mo dern cryptographic technology. One purp ose of the pap er is to give some answers to those questions resulting from absence of a complete picture. Area: Software Agents Keywords: security, agent architecture, agent-based public key infrastructure PKI, public key cryptosystem PKCS, con dentiality, authentication, integrity, nonrepudiation. 1 1 Intro duction If you are going to design and develop a software agent-based real application system for elec- tronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent mo del designers.
    [Show full text]
  • 1. Course Information Are Handed Out
    6.826—Principles of Computer Systems 2006 6.826—Principles of Computer Systems 2006 course secretary's desk. They normally cover the material discussed in class during the week they 1. Course Information are handed out. Delayed submission of the solutions will be penalized, and no solutions will be accepted after Thursday 5:00PM. Students in the class will be asked to help grade the problem sets. Each week a team of students Staff will work with the TA to grade the week’s problems. This takes about 3-4 hours. Each student will probably only have to do it once during the term. Faculty We will try to return the graded problem sets, with solutions, within a week after their due date. Butler Lampson 32-G924 425-703-5925 [email protected] Policy on collaboration Daniel Jackson 32-G704 8-8471 [email protected] We encourage discussion of the issues in the lectures, readings, and problem sets. However, if Teaching Assistant you collaborate on problem sets, you must tell us who your collaborators are. And in any case, you must write up all solutions on your own. David Shin [email protected] Project Course Secretary During the last half of the course there is a project in which students will work in groups of three Maria Rebelo 32-G715 3-5895 [email protected] or so to apply the methods of the course to their own research projects. Each group will pick a Office Hours real system, preferably one that some member of the group is actually working on but possibly one from a published paper or from someone else’s research, and write: Messrs.
    [Show full text]
  • Hypertext Semiotics in the Commercialized Internet
    Hypertext Semiotics in the Commercialized Internet Moritz Neumüller Wien, Oktober 2001 DOKTORAT DER SOZIAL- UND WIRTSCHAFTSWISSENSCHAFTEN 1. Beurteiler: Univ. Prof. Dipl.-Ing. Dr. Wolfgang Panny, Institut für Informationsver- arbeitung und Informationswirtschaft der Wirtschaftsuniversität Wien, Abteilung für Angewandte Informatik. 2. Beurteiler: Univ. Prof. Dr. Herbert Hrachovec, Institut für Philosophie der Universität Wien. Betreuer: Gastprofessor Univ. Doz. Dipl.-Ing. Dr. Veith Risak Eingereicht am: Hypertext Semiotics in the Commercialized Internet Dissertation zur Erlangung des akademischen Grades eines Doktors der Sozial- und Wirtschaftswissenschaften an der Wirtschaftsuniversität Wien eingereicht bei 1. Beurteiler: Univ. Prof. Dr. Wolfgang Panny, Institut für Informationsverarbeitung und Informationswirtschaft der Wirtschaftsuniversität Wien, Abteilung für Angewandte Informatik 2. Beurteiler: Univ. Prof. Dr. Herbert Hrachovec, Institut für Philosophie der Universität Wien Betreuer: Gastprofessor Univ. Doz. Dipl.-Ing. Dr. Veith Risak Fachgebiet: Informationswirtschaft von MMag. Moritz Neumüller Wien, im Oktober 2001 Ich versichere: 1. daß ich die Dissertation selbständig verfaßt, andere als die angegebenen Quellen und Hilfsmittel nicht benutzt und mich auch sonst keiner unerlaubten Hilfe bedient habe. 2. daß ich diese Dissertation bisher weder im In- noch im Ausland (einer Beurteilerin / einem Beurteiler zur Begutachtung) in irgendeiner Form als Prüfungsarbeit vorgelegt habe. 3. daß dieses Exemplar mit der beurteilten Arbeit überein
    [Show full text]
  • The Mother of All Demos
    UC Irvine Embodiment and Performativity Title The Mother of All Demos Permalink https://escholarship.org/uc/item/91v563kh Author Salamanca, Claudia Publication Date 2009-12-12 Peer reviewed eScholarship.org Powered by the California Digital Library University of California The Mother of All Demos Claudia Salamanca PhD Student, Rhetoric Department University of California Berkeley 1929 Fairview St. Apt B. Berkeley, CA, 94703 1 510 735 1061 [email protected] ABSTRACT guide situated at the mission control and from there he takes us This paper analyses the documentation of the special session into another location: a location that Levy calls the final frontier. delivered by Douglas Engelbart and William English on This description offered by Levy as well as the performance in December 9, 1968 at the Fall Computer Joint Conference in San itself, shows a movement in time and space. The name, “The Francisco. Mother of All Demos,” refers to a temporality under which all previous demos are subcategories of this performance. Furthermore, the name also points to a futurality that is constantly Categories and Subject Descriptors in production: all future demos are also included. What was A.0 [Conference Proceedings] delivered on December 9, 1968 captured the past but also our future. In order to explain this extended temporality, Engelbart’s General Terms demo needs to be addressed not only from the perspective of the Documentation, Performance, Theory. technological breakthroughs but also the modes in which they were delivered. This mode of futurality goes beyond the future simple tense continuously invoked by rhetorics of progress and Keywords technology. The purpose of this paper is to interrogate “The Demo, medium performance, fragmentation, technology, Mother of All Demos” as a performance, inquiring into what this augmentation system, condensation, space, body, mirror, session made and is still making possible.
    [Show full text]
  • Ted Nelson History of Computing
    History of Computing Douglas R. Dechow Daniele C. Struppa Editors Intertwingled The Work and Influence of Ted Nelson History of Computing Founding Editor Martin Campbell-Kelly, University of Warwick, Coventry, UK Series Editor Gerard Alberts, University of Amsterdam, Amsterdam, The Netherlands Advisory Board Jack Copeland, University of Canterbury, Christchurch, New Zealand Ulf Hashagen, Deutsches Museum, Munich, Germany John V. Tucker, Swansea University, Swansea, UK Jeffrey R. Yost, University of Minnesota, Minneapolis, USA The History of Computing series publishes high-quality books which address the history of computing, with an emphasis on the ‘externalist’ view of this history, more accessible to a wider audience. The series examines content and history from four main quadrants: the history of relevant technologies, the history of the core science, the history of relevant business and economic developments, and the history of computing as it pertains to social history and societal developments. Titles can span a variety of product types, including but not exclusively, themed volumes, biographies, ‘profi le’ books (with brief biographies of a number of key people), expansions of workshop proceedings, general readers, scholarly expositions, titles used as ancillary textbooks, revivals and new editions of previous worthy titles. These books will appeal, varyingly, to academics and students in computer science, history, mathematics, business and technology studies. Some titles will also directly appeal to professionals and practitioners
    [Show full text]
  • Unreasonable Expectations: an Examination of the Semantic Web
    Unreasonable Expectations: An Examination of the Semantic Web in the Light of the Original Vision for the Project Dónal Deery A research paper submitted to the University of Dublin, in partial fulfillment of the requirements for the degree of Master of Science Interactive Digital Media 2014 Declaration I declare that the work described in this research paper is, except where otherwise stated, entirely my own work and has not been submitted as an exercise for a degree at this or any other university. Signed: ___________________ Dónal Deery 28th February 2014 Permission to lend and/or copy I agree that Trinity College Library may lend or copy this research Paper upon request. Signed: ___________________ Dónal Deery 28th February 2014 Acknowledgements I would like to thank my supervisor Rachel O’Dwyer for her advice, patience, and grammatical assistance during the preparation of this paper. I would also like to thank my parents for their continuing support and positivity. Summary This paper is concerned with the relationship between the Semantic Web as it was originally envisioned and the present status of the endeavour. The Semantic Web is an enhanced version of the existing World Wide Web in which data that can be processed by computers is added to web pages in order to make it easier for users to locate and exchange information. It was proposed by Sir Tim Berners-Lee, the invention of the original Web. The paper begins with a consideration of the original vision for the Semantic Web outlined by Berners-Lee and others around the turn of the millennium.
    [Show full text]
  • Summary of March 12, 2013 FTC Guide, “Dot Com Disclosures” by Susan D
    Originally published in the American Advertising Federation Phoenix Chapter Newsletter (June 2013) Summary of March 12, 2013 FTC Guide, “Dot Com Disclosures” By Susan D. Brienza, Attorney at Ryley Carlock & Applewhite “Although online commerce (including mobile and social media marketing) is booming, deception can dampen consumer confidence in the online marketplace.” Conclusion of new FTC Guide on Disclosures The Federal Trade Commission (“FTC”) has broad powers to regulate and monitor all advertisements for goods and services (with the exception of a few industries such as banking and aviation)— advertisements in any medium whatsoever, including Internet and social media promotions. Under long-standing FTC statutes, regulations and policy, all marketing claims must be true, accurate, not misleading or deceptive, and supported by sound scientific or factual research. Often, in order to “cure” a potentially deceptive claim, a disclaimer or a disclosure is required, e.g., “The following blogs are paid reviews.” Recently, on March 12, 2013, the Federal Trade Commission published a revised version of its 2000 guide known as Dot Com Disclosures, after a two-year process. The new FTC staff guidance, .com Disclosures: How to Make Effective Disclosures in Digital Advertising, “takes into account the expanding use of smartphones with small screens and the rise of social media marketing. It also contains mock ads that illustrate the updated principles.” See the FTC’s press release regarding its Dot Com Disclosures guidance: http://www.ftc.gov/opa/2013/03/dotcom.shtm and the 53-page guide itself at http://ftc.gov/os/2013/03/130312dotcomdisclosures.pdf . I noted with some amusement that the FTC ends this press release and others with: “Like the FTC on Facebook, follow us on Twitter.
    [Show full text]
  • Oral History of Butler Lampson
    Oral History of Butler Lampson Interviewed by: Alan Kay Recorded: August 22, 2006 Cambridge, Mass. CHM Reference number: X3697.2007 © 2006 Computer History Museum Oral History of Butler Lampson Alan Kay: Part of my job here as given by the Computer History Museum is to try and get a few good words from you that we could use as the opening blurb for your award from the Computer History Museum. But also to get an oral history. Butler Lampson: I was going to say, I thought the job was to record hours of brilliant conversation that historians in 2100 will pore over. Kay: That is your job. My job is to only to try and instigate it. My theory about this thing is that you should not try and talk short. Lampson: Well, we’ve got lots of time right? Kay: Okay. We do have lots of time and tape is cheap. Lampson: Tape is cheap. Right. My sister’s a film editor and she hates it. She says things were much better in the days when film was expensive, because people would think about what they shot. Now, she says, they shoot hundreds of hours of crap and then they expect the editor to sort it out. Kay: We have to transcribe those hundreds of hours. Lampson: Yeah. Somebody’s got to look at it, it’s got to be fussed around with, and besides, she says, frequently in the whole of hundreds of hours you don’t find what you want because nobody thought about it beforehand. Kay: You remember Bonnie, my wife, ran a film and video company for ten years.
    [Show full text]
  • Insert a Hyperlink OPEN the Research on First Ladies Update1 Document from the Lesson Folder
    Step by Step: Insert a Hyperlink Step by Step: Insert a Hyperlink OPEN the Research on First Ladies Update1 document from the lesson folder. 1. Go to page four and select the Nancy Reagan picture. 2. On the Insert tab, in the Links group, click the Hyperlink button to open the Insert Hyperlink dialog box. The Insert Hyperlink dialog box opens. By default, the Existing File or Web Page is selected. There are additional options on where to place the link. 3. Key http://www.firstladies.org/biographies/ in the Address box; then click OK. Hypertext Transfer Protocol (HTTP) is how the data is transfer to the external site through the servers. The picture is now linked to the external site. 4. To test the link, press Ctrl then click the left mouse button. When you hover over the link, a screen tip automatically appears with instructions on what to do. 5. Select Hilary Clinton and repeat steps 2 and 3. Word recalls the last address, and the full address will appear once you start typing. You have now linked two pictures to an external site. 6. It is recommended that you always test your links before posting or sharing. You can add links to text or phrases and use the same process that you just completed. 7. Step by Step: Insert a Hyperlink 8. Insert hyperlinks with the same Web address to both First Ladies names. Both names are now underlined, showing that they are linked. 9. Hover over Nancy Reagan’s picture and you should see the full address that you keyed.
    [Show full text]
  • At Brunning: People & Technology
    Against the Grain Volume 24 | Issue 6 Article 45 December 2012 At Brunning: People & Technology: At the Only Edge that Means Anything/How We Understand What We Do Dennis Brunning Arizona State University, [email protected] Follow this and additional works at: https://docs.lib.purdue.edu/atg Part of the Library and Information Science Commons Recommended Citation Brunning, Dennis (2012) "At Brunning: People & Technology: At the Only Edge that Means Anything/How We Understand What We Do," Against the Grain: Vol. 24: Iss. 6, Article 45. DOI: https://doi.org/10.7771/2380-176X.6259 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. @Brunning: People & Technology At the Only Edge that Means Anything / How We Understand What We Do by Dennis Brunning (E Humanities Development Librarian, Arizona State University) <[email protected]> Amblin through Charleston… a recent survey of academic eBook editions stakeholders settle into increasingly tighter Patron-driven access continues to oc- to that of a 2008 survey. and mightier Web kingdoms, this mature cupy conference presentations. At the recent In 2008, Jason Price and John McDon- phase of capitalism relies more heavily on 32nd Charleston Conference — as always ald, the authors, found that only about 20% lawyers. Lawyers negotiate and nail down a richly-rewarding and entertaining learning of five academic libraries’ book content the buyouts and mergers; lawyers draw the vacation, timed for late lowcountry autumn were available from the eBook aggregator lines on competition and distribution of the — the chock-full sessions and many eager marketplace.
    [Show full text]
  • Barefoot Into Cyberspace Adventures in Search of Techno-Utopia
    Barefoot into Cyberspace Adventures in search of techno-Utopia By Becky Hogge July 2011 http://www,barefootintocyberspace.com Barefoot into Cyberspace Becky Hogge Read This First This text is distributed by Barefoot Publishing Limited under a Creative Commons Attribution-ShareAlike 2.0 UK: England & Wales Licence. That means: You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. For any reuse or distribution, you must make clear to others the licence terms of this work. The best way to do this is with a link to http://barefootintocyberspace.com/book/hypertext Any of these conditions may be waived by seeking permission from Barefoot Publishing Limited. To contact Barefoot Publishing Limited, email barefootpublishing [AT] gmail [DOT] com. More information available at http://creativecommons.org/licenses/by- sa/2.0/uk/. See the end of this file for complete legalese 2 Barefoot into Cyberspace Becky Hogge Contents Prologue: Fierce Dancing ...................................................................................................................................... 5 Chapter 1: Digging the command line ............................................................................................................
    [Show full text]