Of Daemons, Dogs, and Trees

2021 ◽  
pp. 68-86
Author(s):  
Simone Natale

This chapter examines how AI was embedded in a range of software applications from the late 1970s to the 1990s—a period marked by the emergence of personal computing. Focusing on diverse software artifacts such as computer daemons, digital games, and social interfaces, the chapter interrogates the ways developers introduced deceptive mechanisms within a wider framework promising universal access and ease of use for computing technologies, and how their doing so informed work that was aimed at improving the usability of computing systems. Their explorations of this territory involved a crucial shift away from considering deception something that could be dispelled by making computers more “transparent” and toward the full integration of forms of deception in the experiences of users interacting with AI.

2014 ◽  
Vol 3 (3) ◽  
pp. 67-78
Author(s):  
Ileana Dumitru

To calculate the potential impact of grid on the enterprise, one just needs to look back a decade or so ago. Those who remember how LANs developed in company years before the Web was born can easily get a picture of how Grid Computing in corporations may change in the years to come. In the early days of the Internet, there was a strong opposition to linking computers together in a network. Ultimately, however, the Internet has become a ubiquitous tool, and many experts predict the same outcome for Grid Computing on the enterprise. There are still concerns to consider and obstacles to be overcome, but the momentum behind corporate Grid Computing is quickly gathering pace. The integration of Grid Computing technologies into enterprise computing systems can provide a much richer range of possibilities. This integration should provide enhanced capabilities and interoperability to meet current virtual organization demands.


Author(s):  
Brian Stokes

Background with rationaleBusiness Intelligence (BI) software applications collect and process large amounts of data from one or more sources, and for a variety of purposes. These can include generating operational or sales reports, developing dashboards and data visualisations, and for ad-hoc analysis and querying of enterprise databases. Main AimBusiness Intelligence (BI) software applications collect and process large amounts of data from one or more sources, and for a variety of purposes. These can include generating operational or sales reports, developing dashboards and data visualisations, and for ad-hoc analysis and querying of enterprise databases. Methods/ApproachIn deciding to develop a series of dashboards to visually represent data stored in its MLM, the TDLU identified routine requests for these data and critically examined existing techniques for extracting data from its MLM. Traditionally Structured Query Language (SQL) queries were developed and used for a single purpose. By critically analysing limitations with this approach, the TDLU identified the power of BI tools and ease of use for both technical and non-technical staff. ResultsImplementing a BI tool is enabling quick and accurate production of a comprehensive array of information. Such information assists with cohort size estimation, producing data for routine and ad-hoc reporting, identifying data quality issues, and to answer questions from prospective users of linked data services including instantly producing estimates of links stored across disparate datasets. Conclusion BI tools are not traditionally considered integral to the operations of data linkage units. However, the TDLU has successfully applied the use of a BI tool to enable a rich set of data locked in its MLM to be quickly made available in multiple, easy to use formats and by technical and non-technical staff.


Author(s):  
Michael Davis ◽  
Alice Sedsman

Cloud computing has been heralded as a new era in the evolution of information and communications technologies. ICT giants have invested heavily in developing technologies and mega server facilities, which allow end users to access web-based software applications and store their data off-site. Businesses using cloud computing services will benefit from reduced operating costs as they cut back on ICT infrastructure and personnel. Individuals will no longer need to buy and install software and will have universal access to their data through any internet-ready device. Yet, hidden amongst the host of benefits are inherent legal risks. The global nature of cloud computing raises questions about privacy, security, confidentiality and access to data. Current terms of use do not adequately address the multitude of legal issues unique to cloud computing. In the face of this legal uncertainty, end users should be educated about the risks involved in entering the cloud.


2010 ◽  
Vol 2 (1) ◽  
pp. 30-39 ◽  
Author(s):  
Michael Davis ◽  
Alice Sedsman

Cloud computing has been heralded as a new era in the evolution of information and communications technologies. ICT giants have invested heavily in developing technologies and mega server facilities, which allow end users to access web-based software applications and store their data off-site. Businesses using cloud computing services will benefit from reduced operating costs as they cut back on ICT infrastructure and personnel. Individuals will no longer need to buy and install software and will have universal access to their data through any internet-ready device. Yet, hidden amongst the host of benefits are inherent legal risks. The global nature of cloud computing raises questions about privacy, security, confidentiality and access to data. Current terms of use do not adequately address the multitude of legal issues unique to cloud computing. In the face of this legal uncertainty, end users should be educated about the risks involved in entering the cloud.


2006 ◽  
Vol 21 (3) ◽  
pp. 195-204 ◽  
Author(s):  
ROY STERRITT ◽  
DAVE BUSTARD

Like the autonomic responses in the human body, autonomic computing systems recognize their own health problems and, where possible, respond to correct them. Failing that, external help is required. The purpose of this paper is to consider how autonomic systems might be structured to facilitate health monitoring. The approach uses a ‘pulse’ monitor for each autonomic element, which provides a reflex reaction facility and basic information on the current state (health) of that element. The pulse mechanism extends the NASA beacon monitor concept. The different ways that pulse information might be communicated and used are examined. The discussion is illustrated with a personal computing example.


1998 ◽  
Vol 1 (1) ◽  
Author(s):  
Angela Di Serio

One of the current research areas in the field of computer science is distributed computing systems. In distributed systems, software is partitioned into modules and executed using a number of processors concurrently. A major difficulty in using distributed and paralleling computing systems has been ease of use. There is not a clear methodology for programmers for using these systems effectively. This work seeks to assess the viability of using analytic performance analysis to assist in the evaluation of candidate algorithms through its application to a case study. This will help us to estimate the total execution time and the optimal number of processors.


2016 ◽  
pp. 483-502
Author(s):  
Chang Liu ◽  
Ying Zhong

Multi-level adaptation in end-user development (EUD) is an effective way to enable non-technical end users such as educators to gradually introduce more functionality with increasing complexity to 3D virtual learning environments developed by themselves using EUD approaches. Parameterization, integration, and extension are three levels of adaptation ranging from straightforward to complex in terms of what end users have to understand in order to develop functional software applications, all within reach of end users without special training on programming. A 3D educational application EUD system prototype, iVirtualWorld, has been expanded to support 3D virtual chemistry experiments generation using these three levels of EUD adaptation. An evaluation has been conducted on 18 participants from the education domain, and the results confirmed ease-of-learn, ease-of-use, and usefulness of this solution. Contributions of this paper are 1) a paradigm for applying EUD technologies in 3D virtual learning environment creation; 2) an easy-to-use tool for educators to build customized virtual chemistry experiments; and 3) empirical assessment data for the multi-level adaptation solution.


Author(s):  
Abbas Moallem

In this article, I review the procedures and techniques used to significantly improve the ease of use of enterprise software applications in the framework of a medium-size company with limited resources. The achievements and lessons learned from applying these techniques to the development process are presented. Then several examples of screens before and after implementing the user-centered design approach and user and market reaction to this achievement are provided.


Sign in / Sign up

Export Citation Format

Share Document