PROACTIVE COMPUTING Human-In-The-Loop Computing Has Its Limits

Total Page:16

File Type:pdf, Size:1020Kb

PROACTIVE COMPUTING Human-In-The-Loop Computing Has Its Limits PROACTIVE COMPUTING Human-in-the-loop computing has its limits. What must we do differently to prepare for the networking of thousands of embedded processors per person? And how do we move from human-centered to human-supervised computing? or the past 40 years, most of the IT research community has focused on interactive computing, J.C.R. Licklider’s powerful and human-centered vision of human-computer symbiosis [3]. In tan- dem with this research has come the creation of an IT industry that is hurtling toward the human/machine/network breakpoint—the point at which the number of networked interactive computers will Fsurpass the number of people on the planet. We still have a long way to go before Licklider’s vision is attained—and are many years from extending per-capita penetration to most parts of the world. However, “missing science” may no longer be the factor limiting progress toward these long-cherished goals. It is reasonable, though perhaps heretical, to suggest that refinements of the existing science base will be sufficient to drive these efforts forward. It is time for a change. The computer science research community now enjoys a rare and exciting opportunity to redefine its agenda and establish the new goals that will propel society beyond interactive computing and the human/machine breakpoint. In lifting our sights toward a world in which net- worked computers outnumber human beings by a hundred or thousand to one, we should consider what these “excess” computers will be doing and craft a research agenda that can lead to increased human productivity and quality of life. David Tennenhouse COMMUNICATIONS OF THE ACM May 2000/Vol. 43, No. 5 43 Figure 1. The four quadrants of physical” explores the pervasive coupling of net- ubiquitous computing. worked systems to their environments. Getting real. Proactive computers will routinely respond to external stimuli at faster-than-human speeds. Research in this area must bridge the gap Proactive between control theory and computer science. I Pervasive Getting out. Interactive computing deliberately I Human-supervised places human beings in the loop. However, shrink- ing time constants and sheer numbers demand research into proactive modes of operation in which humans are above the loop. Interactive Office/Document There are two simple reasons why we should divert I Human-centered some of our intellectual resources to proactive com- Manual vs. Autonomous vs. Manual puting: The vast majority of new computers will be proactive, and these nodes will be the principal sources and sinks of information. Office vs. Field The bulk of the IT industry is presently focused on office automation, e-commerce, Figure 2. Where will the computers be? and their associated networking. Judging by our current research profile, an independent Where has computer science focused? Where are the processors? observer might believe that the distribution Interactive 2% Robots 6% of new computers is dominated by the 150 Vehicles 12% Vehicles teractiv In e million or so new laptop, desktop, and mputer Co s server nodes that will power the growth of r a ar e e interactive computation. y y / r s e Although the creation of an industry that t r p Servers a p consumes such a large number of computers M 0 B 5 8 1 per year is a tremendous achievement, these E d mb dde C e rs numbers pale by comparison to the eight- ompute Robots billion-or-more computational nodes that Vehicles Fixed 80% Infrastructure will be deployed worldwide this year. As shown in Figures 1 and 2, the vast majority of these devices will be embedded in other What Should We Do Differently? objects. Rather than being in direct contact with Although I lack Licklider’s clarity as to what the next human beings, they will be in direct contact with 40 years of computation might bring, I am con- their environments—able to monitor and shape the vinced that the first steps toward a new agenda must physical phenomena that surround them. include: a fundamental reexamination of the bound- Since the rate of growth of these embedded ary between the physical and virtual worlds; changes devices exceeds that of their interactive cousins, the in the time constants at which computation is computer science research community has no choice applied; and movement from human-centered to but to follow the processors and invest a larger frac- human-supervised (or even unsupervised) comput- tion of its intellectual capital in this space. In doing ing. While some work has been done in each of so, we would also be following the data, moving these areas, focusing significantly greater attention from environments in which our sources of informa- on them will enable a new mode of operation, tion are largely human-mediated to those in which which I refer to as proactive computing. computers directly tap tremendous sources of In this article, I describe three loci for new grounded information concerning the world around research activities: them. In fact, the essential reason for having more devices than people, and for having them be distrib- Getting physical. Proactive systems will be inti- uted, rather than placed in glass rooms, is their inti- mately connected to the world around them, using mate connectivity with the physical world—and the sensors and actuators to both monitor and shape incremental sources and sinks of information they their physical surroundings. Research into “getting provide. 44 May 2000/Vol. 43, No. 5 COMMUNICATIONS OF THE ACM Why Now? Figure 3. Projected CPU shipments in 2000. To date, Internet deployment has focused on breadth, expanding the Microcontroller Solutions geographic reach of the network to 8,288,300,000 include nodes “in every office and every home.” Although this broad- Cores Embedded Computational ??? Microcontroller Microprocessor Digital signal Microprocessor ening of the Internet will continue units units processor units at an impressive rate, the number 7,257,000,000 281,300,000 600,000,000 150,000,000 of nodes can be increased an addi- 16 bit (ARM) 4 bit 8 bit Texas x86 tional 50-fold by reaching down 1,680,000,000 20,200,000 Instruments into all of the embedded devices at 32 bit (MIPS) 8 bit 16 bit Advanced PowerPC each geographic location. 4,770,000,000 108,000,000 Micro Devices ASSP 16 bit 32 bit SPARC This shift toward deeply net- 764,000,000 153,100,000 worked systems represents a pro- ASIC 32 bit found inflection point that 43,000,000 demands our attention because of Source: DARPA its sheer scale and systems implica- tions. Historically, the lack of network connectivity tance of bridging the physical and virtual domains has stranded the data obtained by embedded quite some time ago [6]. However, the problem has processors and led to rigid software regimes con- largely been ignored by the mainstream artificial strained by one-time programmability. However, intelligence and computer science communities.1 various efforts are beginning to unlock the informa- Although we have done a marvelous job creating vir- tion derived by huge numbers of sensors and pro- tual environments and exploring a limited range of vide remote access to their actuators (see Pottie’s and interface technologies, such as speech and graphics, Kaiser’s “Wireless Integrated Network Sensors” in the degree to which interface research has been this issue). human-centered may have blinded us to many Isn’t this the same as ubiquitous computing? In his opportunities beyond interactive computing. 1991 article [8], Mark Weiser, who was chief tech- The challenge is to develop mechanisms that nologist of Xerox Palo Alto Research Center, forecast allow the software properties we have exploited in that computation would become so ubiquitous that the development of our virtual worlds to be pushed individuals would no longer be conscious of its every as close as possible to the physical environment— application, drawing instead on it as frequently and right up to the converters and transducers that touch reflexively as when they reach for a light switch. As the physical world. One example of an effort in this shown in Figure 3, the ubiquitous computing space direction is the SpectrumWare project [7] at MIT in can be divided along two dimensions—one having to which samples corresponding to wide bands of the do with the degree to which the applications are radio-frequency spectrum are dropped, en masse, office-centered, and the other having to do with the into memory, so that traditional radio functions, degree to which the focus of the computational node such as demodulation, can be performed by user- and its interfaces is on interacting with human beings mode application software. Making large swaths of vs. interacting with the rest of its environment. the spectrum accessible to the programmer opens Although Weiser’s vision was quite sweeping, the door to new algorithmic approaches and wave- few researchers have broken with our traditional forms that might not have been considered in tradi- emphasis on human interaction. Instead, most tional digital signal processing (DSP) environments. research has been confined to the figure’s lower-left The following paragraphs address some of the quadrant. Proactive computing represents an node-level challenges and opportunities associated agenda for the exploration of the upper-right quad- with getting physical: rant of ubiquitous computing—and the expansion Sensors and actuators. One of the distinguishing of our intellectual horizons beyond the interactive aspects of proactive nodes is that they will be domain. In short, it’s time for researchers to declare equipped with sensors and/or actuators. Recent victory on office automation. work on microelectromechanical systems (MEMS) Let’s Get Physical 1Notable exceptions are our colleagues working on robotics.
Recommended publications
  • Purpose and Introductions
    Desktop Publishing Pioneer Meeting Day 1 Session 1: Purpose and Introductions Moderators: Burt Grad David C. Brock Editor: Cheryl Baltes Recorded May 22, 2017 Mountain View, CA CHM Reference number: X8209.2017 © 2017 Computer History Museum Table of Contents INTRODUCTION ....................................................................................................................... 5 PARTICIPANT INTRODUCTIONS ............................................................................................. 8 Desktop Publishing Workshop: Session 1: Purpose and Introduction Conducted by Software Industry Special Interest Group Abstract: The first session of the Desktop Publishing Pioneer Meeting includes short biographies from each of the meeting participants. Moderators Burton Grad and David Brock also give an overview of the meeting schedule and introduce the topic: the development of desktop publishing, from the 1960s to the 1990s. Day 1 will focus on the technology, and day 2 will look at the business side. The first day’s meeting will include the work at Xerox PARC and elsewhere to create the technology needed to make Desktop Publishing feasible and eventually economically profitable. The second day will have each of the companies present tell the story of how their business was founded and grew and what happened eventually to the companies. Jonathan Seybold will talk about the publications and conferences he created which became the vehicles which popularized the products and their use. In the final session, the participants will
    [Show full text]
  • Operating System Support for Mobile Interactive Applications
    Operating System Support for Mobile Interactive Applications Dushyanth Narayanan August 2002 CMU-CS-02-168 School of Computer Science Computer Science Department Carnegie Mellon University Pittsburgh, PA Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Thesis Committee: M. Satyanarayanan, Chair Christos Faloutsos Randy Pausch John Wilkes, Hewlett-Packard Laboratories Copyright c 2002 Dushyanth Narayanan This research was supported by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Materiel Command (AFMC) under contracts F19628-93-C-0193 and F19628-96-C-0061, the Space and Naval Warfare Systems Center (SPAWAR) / U.S. Navy (USN) under contract N660019928918, the Na- tional Science Foundation (NSF) under grants CCR-9901696 and ANI-0081396, IBM Corporation, Intel Corporation, Compaq, and Nokia. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies or endorsements, either express or implied, of DARPA, AFMC, SPAWAR, USN, the NSF, IBM, Intel, Compaq, Nokia, Carnegie Mellon University, the U.S. Government, or any other entity. Keywords: interactive applications, mobile computing, ubiquitous computing, multi- fidelity algorithm, application-aware adaptation, predictive resource management, history- based demand prediction, augmented reality, machine learning Abstract Mobile interactive applications are becoming increasingly important. One such application alone — augmented reality — has enormous potential in fields ranging from entertainment to aircraft maintenance. Such applications demand good interactive response. However, their environments are resource-poor and turbulent, with frequent and dramatic changes in resource availability. To keep response times bounded, the application and system together must adapt to changing resource conditions.
    [Show full text]
  • School of Interactive Computing 1
    School of Interactive Computing 1 CS 1171. Introductory Computing in MATLAB. 1 Credit Hour. SCHOOL OF INTERACTIVE For students with a solid introductory computing background needing to demonstrate proficiency in the MATLAB language. COMPUTING CS 1301. Introduction to Computing. 3 Credit Hours. Introduction to computing principles and programming practices with an Interactive and intelligent computing is an emerging discipline on the emphasis on the design, construction and implementation of problem frontier of ways computation impacts the external world. The School of solutions use of software tools. Interactive Computing advances computing-mediated interactions by encompassing fields ranging from artificial intelligence and machine CS 1301R. Introduction to Computing for Computer Science Recitation. 0 learning to graphics and computer vision to interface design and Credit Hours. empirical methods. We don't just evaluate technology, we create Recitation for CS 1301. technology that makes interactions better. Much of the research within CS 1315. Introduction to Media Computation. 3 Credit Hours. the School of Interactive Computing produces new artifacts that embody Introduction to computation (algorithmic thinking, data structures, new capabilities or methods. Examples include: data transformation and processing, and programming) in a media and communication context. Credit not awarded for both CS 4452 and • Individuals working with traditional computers CS 1315. • Groups of people using ubiquitous computing capabilities throughout CS 1315R. CS 1315 Recitation. 0 Credit Hours. various environments Recitation for CS 1315. • Researchers visualizing scientific data CS 1316. Representing Structure and Behavior. 3 Credit Hours. • Students developing and altering middle school physics simulations Modeling the structure of media (e.g., music, graphical scenes) using • Automated intelligent surveillance systems monitoring airport dynamic data structures.
    [Show full text]
  • Human-Computer Interaction
    THE INTERACTION 3 OVERVIEW n Interaction models help us to understand what is going on in the interaction between user and system. They address the translations between what the user wants and what the system does. n Ergonomics looks at the physical characteristics of the interaction and how these influence its effectiveness. n The dialog between user and system is influenced by the style of the interface. n The interaction takes place within a social and organizational context that affects both user and system. 124 Chapter 3 n The interaction 3.1 INTRODUCTION In the previous two chapters we have looked at the human and the computer respect- ively. However, in the context of this book, we are not concerned with them in isolation. We are interested in how the human user uses the computer as a tool to perform, simplify or support a task. In order to do this the user must communicate his requirements to the computer. There are a number of ways in which the user can communicate with the system. At one extreme is batch input, in which the user provides all the information to the computer at once and leaves the machine to perform the task. This approach does involve an interaction between the user and computer but does not support many tasks well. At the other extreme are highly interactive input devices and paradigms, such as direct manipulation (see Chapter 4) and the applications of virtual reality (Chapter 20). Here the user is constantly providing instruction and receiving feed- back. These are the types of interactive system we are considering.
    [Show full text]
  • CS 160, Fall ‘04 User Interface Design, Prototyping,, & Evaluation Professor Canny
    CS 160, Fall ‘04 User Interface Design, Prototyping,, & Evaluation Professor Canny History of HCI Personalities: CS 160: Lecture 2 * Vannevar Bush - Universal information access * J.C.R. Licklider - Networking, Agents * Ivan Sutherland - Sketchpad Professor John Canny * Doug Engelbart - Mouse, GUI, Word proc... * Ted Nelson - Hypertext Fall 2004 * Alan Kay - OO programming, Laptops * Don Norman - Cognitive principles * Jacob Nielsen - Usability 9/1/2004 1 9/1/2004 2 History of HCI History of HCI Systems: Politics * Memex - 1945 (concept) * Military Funding *Sketchpad -1963 + NDRC - OSRD - ARPA – DARPA * Elite universities (MIT, Stanford, CMU, Berkeley) * NLS (oNLine System) - 1963-68 * NSF 1950 present +(mouse ‘64) 1968 * Xerox PARC - 1970 present * Xerox Alto ‘72, Star ‘81 Dynabook * Apple - NeXT *Grid Compass 1983 * Hypertext 1967... 1983 * Apple Lisa ‘83, Mac ‘84, NeXT ‘88 + Prototypes: HES 1969, ZOG 1975... * Powerbook 1991 + Xanadu 1981, not funded ‘til 87 (Hypercard 1987) * HTML, HTTP 1994 + 1989 Xanadu -> Autodesk, WWW proposal 9/1/2004 3 9/1/2004 4 Online History People There was an excellent PBS special on the history of Vannevar Bush (1890-1974) computing that covered most of these topics: * Engineer by training (MIT) http://www.pbs.org/opb/nerds2.0.1/ * Differential analyzer - 1930 * Led computing research in ‘30s * Created military research + NDRC ‘40, OSRD ‘41-47 * Managed nuclear weapons research throughout the 40’s * Wrote “science - the endless frontier” 1945 * Military consultant through 50’s 9/1/2004 5 9/1/2004 6 1 CS 160, Fall ‘04 User Interface Design, Prototyping,, & Evaluation Professor Canny Memex People Its 1945, what should the ultimate computer look Bush’s “as we may think” 1945 like? * Proposed the “Memex” a very modern computer What should it do? 9/1/2004 7 9/1/2004 8 Bush’s Memex Post-Memex Individuals store all personal books, records, After WWII, Bush continued to push for communications analogue computers (and against digital).
    [Show full text]
  • Course Introduction
    Introduction & Course Overview CS6501: Human-Computer Interaction Seongkook Heo Fall 2020, Department of Computer Science Video Recording • All zoom classes will be video-recorded for students who cannot join live meetings • Recorded videos will be uploaded to Collab and only enrolled students will be able to access them • We will have student presentations and discussions – so you may appear on the video. If you want your video to be masked or removed, please tell me after class Feel free to jump in and ask any questions or give any feedback to your peers What is Human-Computer Interaction? What is Human-Computer Interaction? Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. ACM SIGCHI Definition, 1996 What is Human-Computer Interaction? Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. Kantowitz, B. H., & Sorkin, R. D. (1983). Human factors: Understanding People-System Relationships HCI: A Brief History 1968 – Douglas Engelbart gives the Mother of all Demos “As We May Think”, Vannevar Bush (1945) https://www.theatlantic.com/magazine/archive/1945/07/as-we-may-think/303881/ “As We May Think”, Vannevar Bush (1945) https://www.theatlantic.com/magazine/archive/1945/07/as-we-may-think/303881/ Sketchpad, Ivan Sutherland (1962) https://www.youtube.com/watch?v=6orsmFndx_o
    [Show full text]
  • Funding a Revolution: Government Support for Computing Research
    Funding a Revolution: Government Support for Computing Research FUNDING A REVOLUTION GOVERNMENT SUPPORT FOR COMPUTING RESEARCH Committee on Innovations in Computing and Communications: Lessons from History Computer Science and Telecommunications Board Commission on Physical Sciences, Mathematics, and Applications National Research Council NATIONAL ACADEMY PRESS Washington, D.C. 1999 Copyright National Academy of Sciences. All rights reserved. Funding a Revolution: Government Support for Computing Research NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the fur- therance of science and technology and to their use for the general welfare. Upon the authority of the charter granted to it by the Congress in 1863, the Academy has a mandate that requires it to advise the federal government on scientific and technical matters. Dr. Bruce Alberts is president of the National Academy of Sciences. The National Academy of Engineering was established in 1964, under the charter of the National Academy of Sciences, as a parallel organization of outstanding engineers. It is autonomous in its administration and in the selection of its members, sharing with the National Academy of Sciences the responsibility for advising the federal government.
    [Show full text]
  • The Xerox "Star": a Retrospective
    The Xerox "Star": A Retrospective The Xerox "Star": A Retrospective Jeff Johnson and Teresa L. Roberts, U S WEST Advanced Technologies William Verplank, IDTwo David C. Smith, Cognition, Inc. Charles Irby and Marian Beard, Metaphor Computer Systems Kevin Mackey, Xerox Corporation a version of this paper appeared in IEEE Computer, September 1989 and also in the book Human Computer Interaction: Toward the Year 2000 by Morgan Kaufman. The figures used in this web page aren't very good reproductions, but they are readable. ...Dave Curbow Abstract The Xerox Star has had a significant impact upon the computer industry. In this retrospective, several of Star's designers describe how Star was and is unique, its historical antecedents, how it was designed and developed, how it has evolved since its introduction, and, finally, some lessons learned. Introduction In April of 1981, Xerox introduced the 8010 "Star" Information System. Star's introduction was an important event in the history of personal computing because it changed notions of how interactive systems should be designed. Several of Star's designers, some of whom were responsible for the original design and others of whom designed recent improvements, describe in this article where Star came from, what is distinctive about it, and how the original design has changed. In doing so, we hope to correct some misconceptions about Star that we have seen expressed in the trade press, and to relate some of what we have learned from the experience of designing it.1* In this article, the name "Star" usually refers to both Star and its successor, ViewPoint.
    [Show full text]
  • Ussw Rotch Structures and Interactivity in Media: a Prototype for the Electronic Book by David S
    Structures and Interactivity of Media: A Prototype for the Electronic Book by David S. Backer B.S., Washington University, St. Louis 1972 M.S., University of Massachusetts, Amherst 1976 Submitted to the Media Arts and Sciences Section in partial fulfillment of the requirements of the degree Doctor of Philosophy in Media Arts and Sciences at the Massachusetts Institute of Technology June 1988 Copyright (c) 1988 Massachusetts Institute of Technology All Rights Reserved i Signature of Author ........................................... .... Media Arts and Sciences Section April 29, 1988 Certified by ............. ........... Andrew Lippman Lecturer, Associate Director, Media Laboratory A Disserttion Supervgor Accepted by ................... Professor tephen Benton Chairman Departmental Committee for Graduate Students OFMMIOLOY JUN 16 1988 ussw Rotch Structures and Interactivity in Media: A Prototype for the Electronic Book by David S. Backer Submitted to the Media Arts and Sciences section on April 29, 1988 in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Media Arts and Sciences Abstract A prototype electronic book is proposed which is a synthesis of the access techniques of conventional books and interactive computing systems. It is the "Movie Manual" project, a powerful combination of technologies with styles of use modeled on those of a printed book, but with dramatically expanded powers of display and personalization. The Movie Manual is a training and teaching system that uses personal computing and optical videodisc storage to give its user access to text, sound, and images through a touch sensitive television screen. The result is a composite medium which embodies characteristics of traditional media such as books, film, and television, but provides access through a powerful and personalized interface.
    [Show full text]
  • Strategic Computing : DARPA and the Quest for Machine Intelligence, 1983–1993 / Alex Roland with Philip Shiman
    Strategic Computing History of Computing I. Bernard Cohen and William Aspray, editors William Aspray, John von Neumann and the Origins of Modern Computing Charles J. Bashe, Lyle R. Johnson, John H. Palmer, and Emerson W. Pugh, IBM’s Early Computers Paul E. Ceruzzi, A History of Modern Computing I. Bernard Cohen, Howard Aiken: Portrait of a Computer Pioneer I. Bernard Cohen and Gregory W. Welch, editors, Makin’ Numbers: Howard Aiken and the Computer John Hendry, Innovating for Failure: Government Policy and the Early British Com- puter Industry Michael Lindgren, Glory and Failure: The Difference Engines of Johann Mu¨ller, Charles Babbage, and Georg and Edvard Scheutz David E. Lundstrom, A Few Good Men from Univac R. Moreau, The Computer Comes of Age: The People, the Hardware, and the Software Emerson W. Pugh, Building IBM: Shaping an Industry and Its Technology Emerson W. Pugh, Memories That Shaped an Industry Emerson W. Pugh, Lyle R. Johnson, and John H. Palmer, IBM’s 360 and Early 370 Systems Kent C. Redmond and Thomas M. Smith, From Whirlwind to MITRE: The R&D Story of the SAGE Air Defense Computer Alex Roland with Philip Shiman, Strategic Computing: DARPA and the Quest for Machine Intelligence, 1983–1993 Rau´l Rojas and Ulf Hashagen, editors, The First Computers—History and Architectures Dorothy Stein, Ada: A Life and a Legacy John Vardalas, The Computer Revolution in Canada: Building National Technologi- cal Competence, 1945–1980 Maurice V. Wilkes, Memoirs of a Computer Pioneer Strategic Computing DARPA and the Quest for Machine Intelligence, 1983–1993 Alex Roland with Philip Shiman The MIT Press Cambridge, Massachusetts London, England 2002 Massachusetts Institute of Technology All rights reserved.
    [Show full text]
  • High Performance
    UTAH COMPUTER HISTORY PROJECT Promontory Summit, Utah, was the location of the famous chips using VLSI. He developed the Cosmic Cube (1981), an "golden spike" representing the completion of the early message-passing system with a hypercube interconnect “In 1967 ... I had an annual ARPA contractors meeting, this time at the University of Michigan, Ann Arbor. transcontinental railroad in 1869. A century later, University topology commercialized as the Intel iPSC. Seitz then of Utah's role as the fourth node on the original ARPANET founded Myricom, capitalizing on custom VLSI designs to ... at that meeting, I announced that [the ARPANET] was what ARPA was going to do. After the meeting, I was referred to as the second golden spike, connecting Utah to provide high-speed local area networks to clusters of three other sites in California in December 1969, followed by workstations (1994). By 2004, Myrinet was used in about 40 was driving back in a rented car to the airport, and in the car was Dave Evans, who was our principal east coast sites a year later. ARPANET research at Utah led to percent of the Top500 HPC systems. interconnect and network emulation design, which continues investigator at the University of Utah, Wes Clark, who was principal investigator at Washington University, today. Storage innovations at Utah focused on representing DIGITAL RECORDING St. Louis, Al Blue, who was my contracting expert and worked for me in ARPA, and Larry [Roberts] and digital sound. Concurrent with the ARPANET advances, University of Utah HIGH researchers made significant advances in digital sound. me.
    [Show full text]
  • On the ARPA/PARC ‘Dream Machine’, Science Funding, High Performance, and UK National Strategy1 Draft Version 1, 11 September 2018
    #29 On the referendum & #4c on Expertise: On the ARPA/PARC ‘Dream Machine’, science funding, high performance, and UK national strategy1 Draft version 1, 11 September 2018 ‘Two hands, it isn’t much considering how the world is infinite. Yet, all the same, two hands, they are a lot.’ Alexander Grothendieck, one of the great mathematicians. ‘There isn’t one novel thought in all of how Berkshire [Hathaway] is run. It’s all about … exploiting unrecognized simplicities.’ Charlie Munger, Warren Buffett’s partner. ‘He [Licklider] was really the father of it all.’ Robert Taylor. ‘Computers are destined to become interactive intellectual amplifiers for everyone in the world universally networked worldwide.’ Licklider, 1960. ‘Class-2 arguments’: where both sides can explain the other person’s view to the other person’s satisfaction (Taylor). ‘[M]uch of our intellectual elite who think they have “the solutions” have actually cut themselves off from understanding the basis for much of the most important human progress.’ Michael Nielsen, author of Reinventing Science. ‘The ARPA/PARC history shows that a combination of vision, a modest amount of funding, with a felicitous context and process can almost magically give rise to new technologies that not only amplify civilization, but also produce tremendous wealth for the society. Isn’t it time to do this again by Reason, even with no Cold War to use as an excuse?’ Alan Kay, a PARC researcher. ‘I have to live in the same cage with these monkeys’, a professor replies to a plea for help in a bureaucratic war. * 1 I’ve given this paper an odd numbering because it fits in both series of blogs.
    [Show full text]