Browsing Files in 3D

Be forewarned—massive spoilers ahead. (The graphic shows the Millennium Falcon sporting a massive spoiler.)

What’s this all about?

The origin story here is that I wanted to review Hackers, a film I enjoy and Chris describes as “awesome/ly bad”. However, Hackers isn’t science fiction. Well, I could argue that it is set in an alternate reality where computer hackers are all physically attractive with fashionable tastes in music and clothing, but that isn’t enough. The film was set firmly in the present day (of 1995) and while the possibilities of computer hacking may be exaggerated for dramatic purposes, all the computers themselves are quite conventional for the time. (And therefore appear quaint and outdated today.)

With the glorious exception of the three dimensional file storage system on the “Gibson” mainframe. This fantastic combination of hardware and software was clearly science fiction then, and remains so today. While one futuristic element is not enough to justify a full review of Hackers, it did start us thinking. The film Jurassic Park also has a 3D file system navigator, which wasn’t covered in depth by either the book or the online review. And when Chris reached out to the website readers, they provided more examples of 3D file systems being added to otherwise mundane computer systems.

So what we have here is a review of a particular interface trope rather than an entire film or TV show: the three dimensional file browsing and navigation interface.

Scope

This review is specifically limited to interfaces that are recognisably file systems, where people search for and manipulate individual documents or programs. Cyberspace, a 3D representation of the Internet or World Wide Web, is too broad a topic, and better covered in individual reviews such as those for Ghost in the Shell and Johnny Mnemonic.

I also originally intended to only include non-science fiction films and shows but Jurassic Park is an exception. Jurassic Park has been reviewed, both in the book and on the website, but the 3D file system was a comparatively minor element. It is included here as a well known example for comparison.

The SciFiInterfaces readership also provided examples of research papers for 3D file system browsing and navigation—rather more numerous than actual production systems, even today. These will inform the reviews but not be discussed individually.

Because we are reviewing a topic, not a particular film or TV show, the usual plot summaries will be shortened to just those aspects that involve the 3D file system. As a bonus, we can also compare and contrast the different interfaces and how they are used. The worlds of Ghost in the Shell and Johnny Mnemonic are so different that it would be unfair to judge individual interfaces against each other, but for this review we are considering 3D file systems that have been grafted onto otherwise contemporary computer systems, and used by unaugmented human beings to perform tasks familiar to most computer users.

Sources

Having decided on our topic and scope, the properties for review are three films and one episode of a TV show.

Jurassic Park, 1993

“I know this!” and Jurassic Park is so well known that I assume that you do too. We will look specifically at the 3D file system that is used by Lex in the control room to reactivate the park systems.

Disclosure, 1994

This film about corporate infighting includes a virtual reality system, complete with headset, glove, laser trackers, and walking surface, which is used solely to look for particular files.

Hackers, 1995

As mentioned in the introduction this film revolves around the hacking of a Gibson mainframe, which has a file system that is both physically three dimensional and represented on computer screens as a 3D browser.

A bar chart. The x-axis is every year between and including 1902 to 2022. The y-axis, somewhat humorously, shows 2-place decimal values up to 1. Three bars at 1.00 appear at 1993, 1994, and 1995. One also appears in 2016, but has an arrow pointing back to the prior three with a label, “(But really, this one is referencing those.)”

All three of these films date from the 1990s, which seems to have been the high point for 3D file systems, both fictional and in real world research.

Community, season 6 episode 2, “Lawnmower Maintenance and Postnatal Care” (2016)

In this 21st century example, the Dean of a community college buys an elaborate virtual reality system. He spends some of his time within VR looking for, and then deleting, a particular file. 

Clockwise from top left: Jurassic Park (1993), Disclosure (1994), Hackers (1995), Community (2016)

And one that almost made it

File browsing in two dimensions is so well established in general-purpose computer interfaces that the metaphor can be used in other contexts. In the first Iron Man film, at around 52 minutes, Tony Stark is designing his new suit with an advanced 3D CAD system that uses volumetric projection and full body gesture recognition and tracking. When Tony wants to delete a part (the head) from the design, he picks it up and throws it into a trashcan.

Tony deletes a component from the design by dropping it into a trashcan. Iron Man (2008)

I’m familiar with a number of 2D and 3D design and drawing applications and in all of them a deleted part quietly vanishes. There’s no more need for visual effects than when we press the delete key while typing.

In the film, though, it is not Tony who needs to know that the part has been deleted, but the audience. We’ve already seen the design rendering moved from one computer to another with an arm swing, so if the head disappeared in response to a gesture, that could have been interpreted as it being emailed or otherwise sent somewhere else. The trashcan image and action makes it clear to the audience what is happening.

So, that’s the set of examples we’ll be using across this series of posts. But before we get into the fiction, in the next post we need to talk about how this same thing is handled in the real world.

Kimoyo Beads

One of the ubiquitous technologies seen in Black Panther is the kimoyo bead. They’re liberally scattered all over the movie like tasty, high-tech croutons. These marble-sized beads are made of vibranium and are more core to Wakandan’s lives than cell phones are to ours. Let’s review the 6 uses seen in the film.

1. Contact-EMP bombs

We first see kimoyo beads when Okoye equips T’Challa with a handful to drop on the kidnapper caravan in the Sambisa forest. As he leaps from the Royal Talon, he flings these, which flatten as they fall, and guide themselves to land on the hoods of the caravan. There they emit an electromagnetic pulse that stops the vehicles in their tracks. It is a nice interaction that does not require much precision or attention from T’Challa.

2. Comms

Wakandans wear bracelets made of 11 kimoyo beads around their wrists. If they pull the comms bead and place it in the palm, it can project very lifelike volumetric displays as part of realtime communication. It is unclear why the bead can’t just stay on the wrist and project at an angle to be facing the user’s line of sight, as it does when Okoye presents to tribal leaders (below.)

We see a fascinating interaction when T’Challa and W’Kabi receive a call at the same time, and put their bracelets together to create a conference call with Okoye.

The scaled-down version of the projection introduces many of the gaze matching problems identified in the book. Similarly to those scenes in Star Wars, we don’t see the conversation from the other side. Is Okoye looking up at giant heads of T’Challa and W’Kabi? Unlikely. Wakanda is advanced enough to manage gaze correction in such displays.

Let me take a moment to appreciate how clever this interaction is from a movie maker’s perspective. It’s easy to imagine each of them holding their own bead separately and talking to individual instances of Okoye’s projection. (Imagine being in a room with a friend and both of you are on a group call with a third party.) But in the scene, she turns to address both T’Challa and W’Kabi. Since the system is doing body-and-face gaze correction, the two VP displays would look slightly different, possibly confusing the audience into thinking these were two separate people on the call. Wakandans would be used to understanding these nuances, but us poor non-Wakandan’s are not.

Identical Okoyes ensures (at least) one of the displays is looking at something weird. It’s confusing.
This is confusing.
Having gaze correction so both Okoyes are looking at T’Challa when she’s talking to him makes it look like there are two different characters. It’s confusing.
This is also confusing.

The shared-display interaction helps bypass these problems and make the technology immediately understandable and seamless.

Later Shuri also speaks with Okoye via communication bead. During this conversation, Shuri removes another bead, and tosses it into a display to show an image and dossier of Killmonger. Given that she’s in her lab, it’s unclear why this gesture is necessary rather than, say, just looking toward a display and thinking, “Show me,” letting the AI Griot interpret from the context what to display.

A final communication happens immediately after as Shuri summons T’Challa to the the lab to learn about Killmonger. In this screenshot, it’s clear that the symbol for the comms bead is an asterisk or star, which mimics the projection rats of the display, and so has some nice semantics to help users learning which symbols do what.

3. Presentation

 In one scene, Okoye gives the tribe rulers a sitrep using her kimoyo beads as a projector. Here she is showing the stolen Wakandan artifact. Readers of the book will note the appearance of projection rays that are standard sci-fi signals that what is seen is a display. A lovely detail in the scene is how Okoye uses a finger on her free hand to change the “slide” to display Klawe. (It’s hard to see the exact gesture, but looks like she presses the projection bead.) We know from other scenes in the movie that the beads are operated by thought-command. But that would not prevent a user from including gestures as part of the brain pattern that triggers an event, and would make a nice second-channel confirmation as discussed in UX of Speculative Brain-Computer Inputs post.

4. Remote piloting

When T’Challa tours Shuri’s lab, she introduces him to remote access kimoyo beads. They are a little bigger than regular beads and have a flared, articulated base. (Why they can’t just morph mid-air like the ones we see in the kidnapper scene?) These play out in the following scene when the strike team needs to commandeer a car to chase Klawe’s Karavan. Oyoke tosses one on the hood on a parked car, its base glows purple, and thereafter Shuri hops into a vibranium-shaped simulacrum of the car in her lab, and remotely operates it.

A quick note: I know that the purple glow is there for the benefit of the audience, but it certainly draws attention to itself, which it might not want to do in the real world.

In the climactic battle of the tribes with Killmonger, Shuri prints a new bracelet and remote control bead for Agent Ross. She places the bracelet on him to enable him to remote pilot the Royal Talon. It goes by very quickly, and the scene is lit quite sparsely, but the moment she puts it on him, you can see that the beads are held together magnetically.

5. Eavesdropping

When Agent Ross is interrogating the captured Klawe, we get a half-second shot to let us know that a kimoyo bead has been placed on his shoulder, allowing T’Challa, Okoye, and Nakia to eavesdrop on the conversation. The output is deliveredby a flattened bone-conducting speaker bead behind their left hears.

6. Healing

Later in the scene, when Killmonger’s bomb grievously wounds Agent Ross in his spine, T’Challa places one of Nakia’s kimoyo beads onto the wound, stabilizing Ross long enough to ferry him to Wakanda where Shuri can fully tend to him. The wound conveniently happens to be kimoyo-bead sized, but I expect that given its shape-shifting powers, it could morph to form a second-skin over larger wounds.


I wondered if kimoyo beads were just given to Wakandan royalty, but it’s made clear in the scene where T’Challa and Nakia walk through the streets of Birnin Zana that every citizen has a bracelet. There is no direct evidence in the film, but given the pro-social-ness throughout, I want to believe that all citizens have free access to the beads, equipping each of them to participate equitably in the culture.

So, most of the interaction is handled through thought-command with gestural augmentation. This means that most of our usual concerns of affordances and constraints are moot. The one thing that bears some comment is the fact that there are multiple beads on the bracelet with different capabilities. How does a user know which bead does what?

As long as the beads can do their job in place on the wrist, I don’t think it matters. As long as all of the beads are reading the user’s thoughts, only the one that can respond need respond. The others can disregard the input. In the real world you’d need to make sure that one thought isn’t interpretable as multiple things, a problem discussed on my team at IBM as disambiguation. Or if they are you must design an interaction where the user can help disambiguate the input, or tell the system which meaning they intend. We never this edge case in Black Panther. 

It seems that some of the beads have specialized functions that cannot be performed by another, each has several symbols engraved into it, the indentions of which glow white for easy identification. The glow is not persistent across all uses, so it must be either context-aware and/or a setting that users can think to change. But even when not lit, the symbols are clear, and clearly distinguishable, so once the user learns the symbols, the labeling should help.


Black Votes Matter

Today is an important day in the United States. It’s election day 2020. Among one of the most important days in U.S. politics, ever. Among Trump’s litany of outrageous lies across his presidency is this whopper: “I have done more for Black Americans than anybody, except for the possible exception of Abraham Lincoln.” (Pause for your spit take and cleaning your screen.)

As infuriating and insulting as this statement is emotionally (like, fuck you for adding “possible” in there, like it’s somehow possible that you’ve done more than freed our black citizens from slavery, you maggot-brained, racist, malignant narccicist) let’s let the Brookings institute break down why, if you believe Black Lives Matter, you need to get out there and vote blue all the way down the ticket.

https://www.cnn.com/2020/11/02/us/ocoee-massacre-100th-anniversary-trnd/index.html

You should read that whole article, but some highlights/reminders

  • Trump ended racial sensitivity training, and put a ban on trainings that utilize critical race theory
  • Hate crimes increased over 200% in places where Trump held a campaign rally in 2016
  • He dismissed the Black Lives Matters movement, said there were “fine people” among white supremacist groups, and rather than condemning the (racist, not gay) Proud Boys, told them to “stand by.”
  • Not a single one of his 53 confirmed appeals court judges circuit justices is black.
  • The criminal mishandling of the COVID-19 pandemic has killed twice as many black Americans as it has white Americans. (Don’t forget he fired the pandemic response team.)

If you are reading this on election day, and have not already done so, please go vote blue. Know that if you are in line even when the polls officially closed, they have to stay open for the entire line to vote. If you have voted, please help others in need. More information is below.

If you are reading this just after election day, we have every evidence that Trump is going to try and declare the election rigged if he loses (please, please let it be when he loses to a massive blue waver). You can help set the expectation among your circle of friends, family, and work colleagues that we won’t know the final results today. We won’t know it tomorrow. We may have a better picture at the end of the week, but it will more likely take until late November to count everyone’s vote, and possibly until mid December to certify everyone’s vote.

And that’s what we do in a liberal democracy. We count everyone’s vote, however long that takes. To demand it in one day during a pandemic is worse than a toddler throwing a “I want it now” tantrum. And we are so very sick of having a toddler in this position.

By Christian Bloom

Brain Upload

Once Johnny has installed his motion detector on the door, the brain upload can begin.

3. Building it

Johnny starts by opening his briefcase and removing various components, which he connects together into the complete upload system. Some of the parts are disguised, and the whole sequence is similar to an assassin in a thriller film assembling a gun out of harmless looking pieces.

jm-6-uploader-kit-a

It looks strange today to see a computer system with so many external devices connected by cables. We’ve become accustomed to one piece computing devices with integrated functionality, and keyboards, mice, cameras, printers, and headphones that connect wirelessly.

Cables and other connections are not always considered as interfaces, but “all parts of a thing which enable its use” is the definition according to Chris. In the early to mid 1990s most computer user were well aware of the potential for confusion and frustration in such interfaces. A personal computer could have connections to monitor, keyboard, mouse, modem, CD drive, and joystick – and every single device would use a different type of cable. USB, while not perfect, is one of the greatest ever improvements in user interfaces.

Why not go wireless? Wireless devices remove the need for a physical connection, but this means that anyone, not just you, could potentially connect. So instead of worrying about whether we have the right kind of cable, we now worry about the right kind of Bluetooth pairing and WiFi encryption password scheme. Mobile wireless devices also need their own batteries, which have to be charged. So wireless may seem visually cleaner, but comes with its own set of problems.

As of early 2016 we have two new standards, Lightning and USB-C, that are orientation-independent (only fifty years after audio cables), high bandwidth, and able to transmit power to peripherals as well. Perhaps by 2021 cables will have made a comeback as the usual way to connect devices.

2. Explaining it

Johnny explains the process to the scientists. He needs them to begin the upload by pushing a button, helpfully labelled “start”, on the gadget that resembles an optical disk drive. There’s a big red button as well, which is not explained but would make an excellent “cancel” button.

jm-6-uploader-kit-b

It would be simpler if Johnny just did this himself. But we will shortly discover that the upload process is apparently very painful. If Johnny had his hands near the system, he might involuntarily push another button or disturb a cable. So for them, having a single, easily differentiated button to press minimizes their chance of messing it up.

1. Making codes

He also sticks a small black disk on the hotel room’s silver remote control. The small disk is evidently is a wireless controller or camera of some kind. The scientists must watch the upload progress counter, and as it approaches the end, use this modified remote to grab three frames from the TV display, which will become the “access code” for the data. (More on this below.)

jm-6-uploader-kit-x

None of the buttons on this remote have markings or labels, but neither Johnny nor the scientist who will be using it are bothered. Perhaps this hotel chain tries to please every possible guest by not favouring any particular language? But even in that case, I’d expect there to be some kind of symbols on the buttons and a multilingual manual to explain the meaning of each. Maybe Johnny spends so much time in hotel suites that he has memorised the button layout?

Short of a mind reading remote that can translate any button press into “what the user intended”, I have to admit this is a terrible interface.

(There is a label on the black disk, but I have no idea what it means or even which script that is. Anyone?)

0. Go go go

Johnny plugs in his implant, puts on a headset with more cables, and bites down on a mouthguard. He’s ready.

jm-6-uploader-kit-d

The scientist pushes the start button and the upload begins. Johnny sees the data stream in his headset as a flood of graphics and text.

jm-7-uploading-a

Why does he need the headset when there is a direct cable connection to the implant? The movie doesn’t make it explicit. It could be related to the images used as the access code. (More on this below.) Perhaps the images need to be processed by the recipient’s own optic nerve system for more reliable storage?

Still, in the spirit of apologetics we should try to find a better explanation than “an opportunity for 1995 cutting edge computer generated graphics.” Perhaps it is a very flashy progress indicator? Older computer systems had blinking lights on disk drives to indicate activity, copied on some of today’s USB sticks. Current-day file upload or download GUIs have progress bars. As processing and graphics capabilities increase, it will be possible for software to display thumbnails or previews of the actual data being transferred without slowing down.

Unfortunately there is an argument against this, which is that the obvious upload progress indicator is a numeric display counting gigabytes down to zero, and it makes a fast chirping sound as a sonic indicator as well. The counter shows the data flowing at gigabytes per second, the entire upload lasting about a minute. There’s also the problem that it’s not Johnny who is interested in knowing whether the upload is scientific data rather than, say, a video collection; but the scientists, and they can’t see it.

jm-7-uploading-b

As the counter drops below one hundred, the scientist points the remote with black disk at the TV display, currently showing a cartoon, and presses the middle button. The image from the TV appears overlaid on the data stream to Johnny. This is a little odd, because Johnny assured the scientists that he wouldn’t know what the access codes were himself. Maybe these brief flashes are not enough time for him to remember these particular images among the gigabytes of visual content. But the way they’re shown to us, I’ll bet you can remember them when they come up again later in the plot.

jm-7-uploading-d

Two more images are grabbed before the counter stops. When the upload finishes, the three images are printed out. (In the original film this is shown upside down, so I have rotated the image.)

jm-7-uploading-f-rotated

Tagged

So what are the images for? The script isn’t clear. I suggest that the images are being used as the equivalents of very large random numbers for whatever cryptography scheme protects the data against unauthorised access. Some current day systems use the timing of key presses and mouse movements as a source of randomness because humans simply can’t move their fingers with microsecond precision. Here, the human element makes it impossible to predict exactly which frame is chosen.

Humans also find images much easier to recognise than hundred digit numbers. Anyone who has seen the printout will be able to say whether a particular image is part of the access code or not with a high degree of confidence. In computer systems today, Secure Shell, or ssh, is a widely used encrypted terminal program for secure access to servers. Recent versions of ssh have a ‘randomart’ capability which shows a small ASCII icon generated from the current cryptographic key to everyone who logs on. If this ASCII icon appears different, this alerts everyone that the server key has been changed.

There’s one potential usability problem with the whole “pick three random images” mechanism. The last frame was grabbed when the counter was very close to zero. What would have happened if he had been too slow and missed altogether? Wouldn’t it be more reliable to have the upload system automatically grab the images rather than rely on a human? Chris suggests that maybe it secretly did grab three images that could have used without human input, but privileged the human input since it was more reliably random.

Quick aside: You may be asking, if images would be so wonderful, why aren’t we using them in this way already? It’s because our current security systems need not just very large random numbers, but very large random numbers with particular mathematical properties such as being prime. But let’s cut Johnny Mnemonic some slack,  saying that by 2021 we may have new algorithms.

OK, back to the plot.

-1. Sharing the codes

The access codes are to be faxed from Beijing to Newark, although this gets interrupted by the Yakuza intruders. This is yet another device with unmarked buttons.

jm-7-uploading-g

This device makes the same beeps and screeches as a 1990s analog fax machine. Since we’ll later learn that all the fax messages and phone calls are stored digitally in cyberspace, this must be a skeuomorphism, the old familiar audio tones now serving just as progress indicators.

As with other audio output, the tones allow the user to know that the transmission is proceeding and when it ends without having to pay full attention to the device. On the other hand, there is potential for confusion here as the digital upload is (presumably) much faster. Most current day computer systems could upload three photos, even in high resolution, well before the sequence of tones would complete. Users would most likely wait longer than actually necessary before moving on to their next task.

-2. Washing up

During the upload Johnny clenches his fists and bites his mouthguard. When the upload finishes, he retreats to the bathroom in considerable pain. At one point blood flows from his nose, and he swipes his hand over the tap to wash it down the drain. The bathroom announces that the water temperature is 17 degrees. We’ll come back to this later.

jm-8-bathroom-tap

As Make It So emphasises in the chapter on brain interfaces, there is nothing in our current knowledge to suggest that writing or reading memories to or from a human brain would be painful. On the other hand, we know that information in the brain isthe shape of the neurons in the brain. Who knows what side effects will happen as those neurons are disconnected and reconnected as they need to be? We don’t know, so can’t really say whether it would hurt or not.

-3. Escaping the Yakuza

As mentioned in a prior post, while he is in the bathroom, the motion detector Johnny installed on the hotel door isn’t very effective and the Yakuza break in, kill everyone else, and acquire the second of the three access code images. Johnny escapes with the first image and flies to Newark, North America. 

Time circuits (which interface the Flux Capacitor)

BttF_137

Time traveling in the DeLorean is accomplished in three steps. In the first, he traveler turns on the “time circuits” using a rocking switch in the central console. Its use is detailed in the original Back to the Future, as below.

BttF_135

In the second, the traveler sets the target month, day, year, hour, and minute using a telephone keypad mounted vertically on the dashboard to the left, and pressing a button below stoplight-colored LEDs on the left, and then with an extra white status indicator below that before some kind of commit button at the bottom.

In the third, you get the DeLorean up to 88 miles per hour and flood the flux capacitor with 1.21 gigawatts of power.

Seems simple.

It’s not…

Rocker switch?

Note that the rocker switch angles down to a nearly 45 degree angle in the on position. One of the worst thing that could happen is for that thing to get accidentally turned off at the wrong time, I imagine. (Back to the Future 4: Lost in Somewhen?) The 45 degree angle makes an accidental activation unlikely, but the T-shaped handle means it could catch on a sleeve or bag handle or something. There are more secure safety switches, but I also wonder if it would be smarter to use the Fake Off mode that most electronics run in today, where they’re never really off, but look off, just waiting for user interaction to spring to life. With a Mr. Fusion on board, I presume powering it isn’t that much of a problem.

Good disambiguation

Note that the pad only has numbers. But Doc uses the military and European standard date format

[day of month] [month] [year]

which might confuse another user, i.e. Marty, entering the stupid USA standard

[month] [day of month] [year]

Though preventing errors is preferable, at least Doc helps Marty recognize errors by displaying the month in 3-character text format, which would help Marty realize if he’d accidentally put in 10 September instead of 09 October.

Bad disambiguation

Note that doc is traveling to 4:29 in the afternoon, and the display has a tiny LED A.M./P.M. indicator. Better is the less ambiguous military time. Sure, audiences might have been confused, but using a 24-hour clock would have been less ambiguous for diegetic users, you could eliminate the AM/PM indicator, and Doc could use the existing number pad for entry without having to either add an “AM” and “PM” button (missing from the console), or doing some annoying “press 1 for AM or 2 for PM nowIVR thing.

While we’re on time disambiguation, what, uh, time zone is this? Did doc only ever plan to fly in and around Hill Valley? It might have been keyed to the Prime Meridian, or to Pacific Time, but if so it would have been very useful to have it marked as such. If not, it should display the current time zone and provide a means to change it. Somehow. With that number pad. (Or more controls.)

Bad input constraint and recovery

It’s wholly possible to enter a day-of-month or month of “99,” which is nonsensical given the Gregorian calendar that we use today. How does the system handle this? A mod function? There’s no clue, but the unconstrained inputs would allow it.

Farther travel?

As the Long Now Foundation reminds us, a four-digit date is really short-sighted. So Doc didn’t want to travel to 10,000 C.E. and see if Zager & Evans were right? And what if he wanted to go meet Amenhotep? How does he specify 1526 B.C.E.? It seems unduly constrained.

Misleading mapping

I don’t know what those LEDs to the left of the input panel do, but I can tell they’re poorly mapped. The colors go, from top to bottom: red, yellow, and green, like a stoplight. Then there’s the extra white LED below that maps to nothing. But the LED colors on the display go from top to bottom red for destination, green for present, yellow for last time departed. Better mapping would have these two agree, or distinct color schemes.

Missing controls

In 1985 dialing a telephone number worked much like the dial-a-date seen here. Punch a sequence of numbers and the system runs with the input. But instant-input systems need a way to correct errors; either the ability to review and correct the input, or to abort the input altogether and start over.

Phone users from back then will recall it was entirely possible to mistype a digit and dial a wrong number. You’d be connected to a stranger who had no idea who this “Marty” you wanted was. This is more serious in the DeLorean than on a phone, as it drops the user into circumstances potentially much more dire, from which there might be no recovery. What would happen if they had accidentally wound up in 21 October 1015? Wholly different story. Is Biff distantly related to Cnut the Great?

Doc might be able to review the input on the display before getting up to speed, but there’s no obvious control for aborting input so far and starting over. (What if he has skipped a digit instead of mistyping one?) A simple delete button would help him correct mistyped digits. Even if he mistyped the first one and only realized it at the end, it wouldn’t be too burdensome to press delete the handful of times.

Rich preview

How does the system confirm for Doc that he’s entered the right date he intended to? On one level, sure, the 7-segment LED output is clear and unambiguous. It’s a nice discrete number. But of course 7-segment 1989 isn’t that easy to distinguish from 1898 when you’re distracted. Better would be to give a preview of the meaning of the choices entered (but not yet enacted) by the user. If there was a video screen in the car, then maybe it could show scenes from old Westerns with the label “Headed to 1898: The Old West.” You could even do it with the cars’ speakers and an audio soundscape if a screen wouldn’t work for space or distraction reasons.

Security

As noted in the overview, Biff(2015) gets into the car to make off for 1955 early in the film. I can’t quite figure out how he was able to figure out turning on the time circuit and that the 88MPH was a target speed, but he did. (Seriously, looking for fan theories here.) Of course Doc might have designed everything to be perfectly understandable for Marty, but that’s no excuse to avoid authenticating the user, since Doc is so panicked about the consequences of the time travel that he’s doing all the times. [sic]

BttF-biff-carjack

Course-correction

The stage managers’ main raison d’être is to course-correct if and when victims begin to deviate from the path required of the ritual.

This begins with the Prep team, long before the victims enter the stage. For example, Jules’ hair dye and Marty’s laced pot. These corrections become more necessary and intense once the victims go on stage.

Making sure there are sexy times

The ritual requires that a sexy young couple have sexy times on stage before they suffer and die. “The mood” can be ruined by many things, but control has mechanisms to cope with most of them. We see three in the movie.

Temperature

The temperature can’t be too hot or too cold, but this isn’t something that can be set and forgot. What counts as the right temperature is a subjective call for the people involved and their circumstances, such as being drunk, or amount and type of clothes worn. Fortunately, the video-audio panopticon lets the stage managers know when a victim speaks about this directly, and do something about it. The moment Jules complains, for instance, Sitterson is able to reach over to a touch-screen display and tap the temperature a few degrees warmer.

Sitterson heats things up.

The gauge is an interesting study. It implies a range possible between 48 and 92 degrees Fahrenheit, each of which is uncomfortable enough to encourage different behaviors in the victims, without the temperature itself being life-threatening.

Moreover, we see that it’s a “blind” control. Before Sitterson taps it, he is only shown the current temperature as a blue rectangle that fills up four bars and that it is exactly 64 degrees. But if he knew he wanted it to be 76 degrees, what, other than experience or training, tells him where he should touch to get to that desired new temperature? Though the gauge provides immediate feedback, it still places a burden on his long-term memory. And for novice users, such unlabeled controls require a trial-and-error method that isn’t ideal. Even the slim area of white coloring at the top, which helpfully indicates temperatures warmer than cooler, appears too late to be useful.

Better would be to have the color alongside or under the gauge with smaller numbers indicated along its length such that Sitterson could identify and target the right temperature on the first try.

Libido

The next thing that can risk the mood is a lack of a victim’s amorous feelings. Should someone not be “feeling it,” Control can pipe sex pheromones to areas on stage. We see Hadley doing this by operating a throttle lever on the electronic-era control panel. After Hadley raises this lever, we see small plumes of mist erupt from the mossy forest floor that Jules and Curt are walking across.

Hadley introduces pheromones to the forest air.

This control, too, is questionable. Let’s first presume it’s not a direct control, like a light switch, but more of a set-point control, like a thermostat. Similar to the temperature gauge above, this control misses some vital information for Hadley to know where to set the lever to have the desired amount of pheromone in the air, like a parts-per-million labeling along the side. Perhaps this readout occurs on a 7-segment readout nearby or a digital reading on some other screen, but we don’t see it.

There is also no indication about how Hadley has specified the location for the pheromone release. It’s unlikely that he’s releasing this everywhere on stage, lest this become a different sort of ritual altogether. There must be some way for him to indicate where, but we don’t see it in use. Perhaps it is one of the lit square buttons to his right.

An interesting question is why the temperature gauge and pheromone controls, which are similar set-point systems, use not just different mechanisms, but mechanisms from different eras. Certainly such differentiation would help the stage managers’ avoid mistaking one for the other, and inadvertently turn a cold room into an orgy, so perhaps it is a deliberate attempt to avoid this kind of mistake.

Lights

The final variable that stands in the way of Jules’ receptiveness (the authors here must acknowledge their own discomfort in having to write about this mechanistic rape in our standard detached and observational tone) is the level of light. After she complains that it is too dark, Hadley turns a simple potentiometer and the “moonlight” on a soft bed of moss behind them grows brighter.

Control responds to Jules’ objection to the darkness.

This, too, is a different control than the others; though it controls what is essentially a floating-point variable. But since it is more of a direct control than the other two, its design as a hard-stop dial makes sense, and keeps it nicely differentiated from the others.

Marty’s Subliminal Messages

Over the course of the movie, several times we hear subliminal messages spoken to directly control Marty. We never see the inputs used by Control, but they do, at least on one occasion, actually influence him, and is one of the ways the victims are nudged into place.

Marty breaks the fourth wall

In addition to Dana & Curt’s almost not getting it on, another control-room panic moment comes when Marty accidentally breaks a lamp and finds one of the tiny spy cameras embedded throughout the cabin. Knowing that this level of awareness or suspicion could seriously jeopardize the scenario, Hadley bolts to a microphone where he says, “Chem department, I need 500 ccs of Thorazine pumped into room 3!”

Marty finds a spy camera

Hadley speaks a command to the Chem department

Careful observers will note while watching the scene that a menu appears on a screen behind him as he’s stating this. The menu lists the following four drugs.

  • Cortisol (a stress hormone)
  • Pheromones (a category of hormonal social signals, most likely sex pheromones)
  • Thorazine (interestingly, an antipsychotic known to cause drowsiness and agitation)
  • Rhohyptase (aka Rhohypnol, the date rape drug)

Given that content, the timing of the menu is curious. It appears, overlaid on the victim monitoring screen, the moment that Hadley says “500.” (Before he can even specify “Thorazine.”) How does it appear so quickly? Either there’s a team in the Chem department also monitoring the scene, and who had already been building a best-guess menu for what Hadley might want in the situation and they just happened to push it to Hadley’s screen at that moment; Or there’s an algorithmic voice- and goal-awareness system that can respond quickly to the phrase “500 ccs” and provide the top four most likely options. That last one is unlikely, since…

  • We don’t see evidence of it anywhere else in the movie
  • Hadley addresses the Chem department explicitly
  • We’d expect him to have his eyes on the display, ready to make a selection on its touch surface, if this was something that happened routinely

But, if we were designing the system today with integrated voice recognition capabilities, it’s what we’d do.

Curt suggests they stick together

After the attack begins on the cabin itself, Curt wisely tells the others, “Look, we’ve got to lock this place down…We’ll go room by room, barricade every window and every door. We’ve got to play it safe. No matter what happens, we have to stay together.” Turns out this is a little too wise for Hadley’s tastes. Sitterson presses two yellow, back-lit buttons on his control panel to open vents in the hallway, that emit a mist. As Curt passes by the vents and inhales, he pauses, turns to the others and says, “This isn’t right…This isn’t right, we should split up. We can cover more ground that way.”

Sitterson knocks some sense out of Curt.

This two-button control seems to indicate drug (single dose) and location, which is sensible. But if you are asking users to select from different variables, it’s a better idea to differentiate them by clustering and color, to avoid mistakes and enable faster targeting.

Locking the doors

Once the victims are in their rooms, Hadley acknowledges it’s time to, “Lock ‘em in.” Sitterson flips a safety cover and presses a back-lit rocker switch, which emits a short beep and bolts the doors to all the victims’ rooms at the same time.

Sitterson bolts the victims’ doors.

Marty in particular notices the loud “clunk” as the bolts slide into place. He tests the door and is confounded when he finds it is, in fact, locked tight. Control’s earlier concern about tipping their hand seems to matter less and less, since this is a pretty obvious manipulation.

The edge of the world

Bolted doors pale in comparison to the moment when Curt, Dana, and Holden violently encounter the limits of the stage. After the demolition team seals the tunnel to prevent escape that way, Curt tries to jump the ravine to the other side so he can fetch help. Unfortunately for him, the ravine is actually an electrified display screen, showing a trompe-l’œil illusion of the far side. By trying to jump the ravine, Curt unwittingly commits suicide by slamming into it.

Curt slams into the edges of the “world” of the cabin.

The effect of the screen is spectacular, full of arcs zipping along hexagonal lines and sparks flying everywhere. Dana and Holden rush to the edge of the cliff to watch him tumble down its vast, concave surface. It seems that if you’ve come this far, Control isn’t as concerned about tipping its hand as it is finishing the job.