Browsing Files in 3D

Be forewarnedβ€”massive spoilers ahead. (The graphic shows the Millennium Falcon sporting a massive spoiler.)

What’s this all about?

The origin story here is that I wanted to review Hackers, a film I enjoy and Chris describes as β€œawesome/ly bad”. However, Hackers isn’t science fiction. Well, I could argue that it is set in an alternate reality where computer hackers are all physically attractive with fashionable tastes in music and clothing, but that isn’t enough. The film was set firmly in the present day (of 1995) and while the possibilities of computer hacking may be exaggerated for dramatic purposes, all the computers themselves are quite conventional for the time. (And therefore appear quaint and outdated today.)

With the glorious exception of the three dimensional file storage system on the β€œGibson” mainframe. This fantastic combination of hardware and software was clearly science fiction then, and remains so today. While one futuristic element is not enough to justify a full review of Hackers, it did start us thinking. The film Jurassic Park also has a 3D file system navigator, which wasn’t covered in depth by either the book or the online review. And when Chris reached out to the website readers, they provided more examples of 3D file systems being added to otherwise mundane computer systems.

So what we have here is a review of a particular interface trope rather than an entire film or TV show: the three dimensional file browsing and navigation interface.

Scope

This review is specifically limited to interfaces that are recognisably file systems, where people search for and manipulate individual documents or programs. Cyberspace, a 3D representation of the Internet or World Wide Web, is too broad a topic, and better covered in individual reviews such as those for Ghost in the Shell and Johnny Mnemonic.

I also originally intended to only include non-science fiction films and shows but Jurassic Park is an exception. Jurassic Park has been reviewed, both in the book and on the website, but the 3D file system was a comparatively minor element. It is included here as a well known example for comparison.

The SciFiInterfaces readership also provided examples of research papers for 3D file system browsing and navigationβ€”rather more numerous than actual production systems, even today. These will inform the reviews but not be discussed individually.

Because we are reviewing a topic, not a particular film or TV show, the usual plot summaries will be shortened to just those aspects that involve the 3D file system. As a bonus, we can also compare and contrast the different interfaces and how they are used. The worlds of Ghost in the Shell and Johnny Mnemonic are so different that it would be unfair to judge individual interfaces against each other, but for this review we are considering 3D file systems that have been grafted onto otherwise contemporary computer systems, and used by unaugmented human beings to perform tasks familiar to most computer users.

Sources

Having decided on our topic and scope, the properties for review are three films and one episode of a TV show.

Jurassic Park, 1993

β€œI know this!” and Jurassic Park is so well known that I assume that you do too. We will look specifically at the 3D file system that is used by Lex in the control room to reactivate the park systems.

Disclosure, 1994

This film about corporate infighting includes a virtual reality system, complete with headset, glove, laser trackers, and walking surface, which is used solely to look for particular files.

Hackers, 1995

As mentioned in the introduction this film revolves around the hacking of a Gibson mainframe, which has a file system that is both physically three dimensional and represented on computer screens as a 3D browser.

A bar chart. The x-axis is every year between and including 1902 to 2022. The y-axis, somewhat humorously, shows 2-place decimal values up to 1. Three bars at 1.00 appear at 1993, 1994, and 1995. One also appears in 2016, but has an arrow pointing back to the prior three with a label, β€œ(But really, this one is referencing those.)”

All three of these films date from the 1990s, which seems to have been the high point for 3D file systems, both fictional and in real world research.

Community, season 6 episode 2, β€œLawnmower Maintenance and Postnatal Care” (2016)

In this 21st century example, the Dean of a community college buys an elaborate virtual reality system. He spends some of his time within VR looking for, and then deleting, a particular file.Β 

Clockwise from top left: Jurassic Park (1993), Disclosure (1994), Hackers (1995), Community (2016)

And one that almost made it

File browsing in two dimensions is so well established in general-purpose computer interfaces that the metaphor can be used in other contexts. In the first Iron Man film, at around 52 minutes, Tony Stark is designing his new suit with an advanced 3D CAD system that uses volumetric projection and full body gesture recognition and tracking. When Tony wants to delete a part (the head) from the design, he picks it up and throws it into a trashcan.

Tony deletes a component from the design by dropping it into a trashcan. Iron Man (2008)

I’m familiar with a number of 2D and 3D design and drawing applications and in all of them a deleted part quietly vanishes. There’s no more need for visual effects than when we press the delete key while typing.

In the film, though, it is not Tony who needs to know that the part has been deleted, but the audience. We’ve already seen the design rendering moved from one computer to another with an arm swing, so if the head disappeared in response to a gesture, that could have been interpreted as it being emailed or otherwise sent somewhere else. The trashcan image and action makes it clear to the audience what is happening.

So, that’s the set of examples we’ll be using across this series of posts. But before we get into the fiction, in the next post we need to talk about how this same thing is handled in the real world.

3 of 3: Brain Hacking

The hospital doesn’t have the equipment to decrypt and download the actual data. But Jane knows that the LoTeks can, so they drive to the ruined bridge that is the LoTek home base. As mentioned earlier under Door Bombs and Safety Catches the bridge guards nearly kill them due to a poorly designed defensive system. Once again Johnny is not impressed by the people who are supposed to help him.

When Johnny has calmed down, he is introduced to Jones, the LoTek codebreaker who decrypts corporate video broadcasts. Jones is a cyborg dolphin.

jm-24-jones-animated

Jones has not just an implant like Johnny or an augmented nervous system like Jane, but a full neural brain interface that gives him active control. The thing behind his eye and under the cable can rotate, and he can also direct and control an external microwave radar dish. In the background there are a lot of cables and blinking lights apparently connecting Jones to the LoTek video broadcast gear.

For his part, Johnny is sitting in a chair, upper head strapped into a helmet-like brain scanner. This one is very big and clunky, perhaps because it is salvaged old technology or perhaps because this is not just a passive scanner, so needs additional elements and power to actively modify the brain.

jm-26-download-b

When this starts operating, we see the same strobing white light flashes that the first scanner used.

J-Bone, the LoTek leader, uses a handheld camera to feed the first access code image into the system. This is yet another piece of talking technology, announcing that the first image has been loaded.

jm-26-download-c

The captured image is processed to remove the perspective keystoning, and displayed on one of three small panels on the wall, side by side. That specialised displays are made solely for displaying three images suggests that this form of access code is a standard method of data protection in 2021. The other two panels display rolling static.

jm-26-download-d-adjusted

Wait…static?

Why is there static in a 2021 system for displaying computer images? It’s not just because they’re analog: old CRT computer monitors went blank if there was nothing to display. This is a missing or scrambled signal.

Since the LoTeks rely on scavenged technology, it’s quite likely that they are the last people on the planet still using coax video cables. Another possibility is that this is a deliberate imitation, as we saw earlier with the digital fax machine that made analog sounds. Computer graphics programmers are constantly wondering whether the screen is black because they didn’t draw anything, or black because they accidently drew everything in that color. The rolling static makes it clear that there is no image to display, not that the image is blank.

The first download attempt is interrupted by the Yakuza attacking the bridge. There’s some equipment damage, but by the end of the fight Johnny and company have recovered the second access code image.

jm-26-download-f-adjusted

Still not enough, but Johnny now attempts to β€œhack his own brain” which is successful (discussed below). The data is finally downloaded and the LoTeks broadcast the cure for NAS worldwide.

Tech Tease

The hacking and downloading take place in another virtual reality space, the internal representation of the implant. These sequences are action-packed and filled with eye catching visuals. If we wanted, there’s much that could be written about, from the visual representations of hacking used in film and TV to the advisability of transmitting vital scientific data through a video encoder. But we never get to see the interface!

Instead, we see Johnny just sit and do nothing other than maintain a death grip on the chair armrests and try not to grind his teeth into fragments. According to the running commentary on the hack provided by J-Bone, Johnny is performing actions in VR. It’s possible that the LoTek brain scanner is a true brain interface that gives him active control by thought alone with no sound or audio experience.

But this is evidently high grade encryption, which could only be broken by an expert hacker. Without visible controls for the brain scanner, the expert hacker would need to be using a direct brain interface. And the hacker would naturally have their own avatar. The only person present who definitely meets all these requirements is not Johnny, but Jones.

Could Jones be really doing all the work? In the original short story it was Jones, and here he’s certainly doing something in virtual reality. Johnny would make a useful distraction, and J-Bone might deliberately mislead the non-LoTek bystanders to keep Jones a secret.

jm-26-download-g

Whether it’s Johnny or Jones, we only get to see what happens, not how. Rather than end on this disappointing note, I’ll now jump back to discuss the more rewarding interfaces for phone calls and cyberspace search sequence.Β 

Brain Upload

Once Johnny has installed his motion detector on the door, the brain upload can begin.

3. Building it

Johnny starts by opening his briefcase and removing various components, which he connects together into the complete upload system. Some of the parts are disguised, and the whole sequence is similar to an assassin in a thriller film assembling a gun out of harmless looking pieces.

jm-6-uploader-kit-a

It looks strange today to see a computer system with so many external devices connected by cables. We’ve become accustomed to one piece computing devices with integrated functionality, and keyboards, mice, cameras, printers, and headphones that connect wirelessly.

Cables and other connections are not always considered as interfaces, but β€œall parts of a thing which enable its use” is the definition according to Chris. In the early to mid 1990s most computer user were well aware of the potential for confusion and frustration in such interfaces. A personal computer could have connections to monitor, keyboard, mouse, modem, CD drive, and joystick – and every single device would use a different type of cable. USB, while not perfect, is one of the greatest ever improvements in user interfaces.

Why not go wireless? Wireless devices remove the need for a physical connection, but this means that anyone, not just you, could potentially connect. So instead of worrying about whether we have the right kind of cable, we now worry about the right kind of Bluetooth pairing and WiFi encryption password scheme. Mobile wireless devices also need their own batteries, which have to be charged. So wireless may seem visually cleaner, but comes with its own set of problems.

As of early 2016 we have two new standards, Lightning and USB-C, that are orientation-independent (only fifty years after audio cables), high bandwidth, and able to transmit power to peripherals as well. Perhaps by 2021 cables will have made a comeback as the usual way to connect devices.

2. Explaining it

Johnny explains the process to the scientists. He needs them to begin the upload by pushing a button, helpfully labelled β€œstart”, on the gadget that resembles an optical disk drive. There’s a big red button as well, which is not explained but would make an excellent β€œcancel” button.

jm-6-uploader-kit-b

It would be simpler if Johnny just did this himself. But we will shortly discover that the upload process is apparently very painful. If Johnny had his hands near the system, he might involuntarily push another button or disturb a cable. So for them, having a single, easily differentiated button to press minimizes their chance of messing it up.

1. Making codes

He also sticks a small black disk on the hotel room’s silver remote control. The small disk is evidently is a wireless controller or camera of some kind. The scientists must watch the upload progress counter, and as it approaches the end, use this modified remote to grab three frames from the TV display, which will become the β€œaccess code” for the data. (More on this below.)

jm-6-uploader-kit-x

None of the buttons on this remote have markings or labels, but neither Johnny nor the scientist who will be using it are bothered. Perhaps this hotel chain tries to please every possible guest by not favouring any particular language? But even in that case, I’d expect there to be some kind of symbols on the buttons and a multilingual manual to explain the meaning of each. Maybe Johnny spends so much time in hotel suites that he has memorised the button layout?

Short of a mind reading remote that can translate any button press into β€œwhat the user intended”, I have to admit this is a terrible interface.

(There is a label on the black disk, but I have no idea what it means or even which script that is. Anyone?)

0. Go go go

Johnny plugs in his implant, puts on a headset with more cables, and bites down on a mouthguard. He’s ready.

jm-6-uploader-kit-d

The scientist pushes the start button and the upload begins. Johnny sees the data stream in his headset as a flood of graphics and text.

jm-7-uploading-a

Why does he need the headset when there is a direct cable connection to the implant? The movie doesn’t make it explicit. It could be related to the images used as the access code. (More on this below.) Perhaps the images need to be processed by the recipient’s own optic nerve system for more reliable storage?

Still, in the spirit of apologetics we should try to find a better explanation than β€œan opportunity for 1995 cutting edge computer generated graphics.” Perhaps it is a very flashy progress indicator? Older computer systems had blinking lights on disk drives to indicate activity, copied on some of today’s USB sticks. Current-day file upload or download GUIs have progress bars. As processing and graphics capabilities increase, it will be possible for software to display thumbnails or previews of the actual data being transferred without slowing down.

Unfortunately there is an argument against this, which is that the obvious upload progress indicator is a numeric display counting gigabytes down to zero, and it makes a fast chirping sound as a sonic indicator as well. The counter shows the data flowing at gigabytes per second, the entire upload lasting about a minute. There’s also the problem that it’s not Johnny who is interested in knowing whether the upload is scientific data rather than, say, a video collection; but the scientists, and they can’t see it.

jm-7-uploading-b

As the counter drops below one hundred, the scientist points the remote with black disk at the TV display, currently showing a cartoon, and presses the middle button. The image from the TV appears overlaid on the data stream to Johnny. This is a little odd, because Johnny assured the scientists that he wouldn’t know what the access codes were himself. Maybe these brief flashes are not enough time for him to remember these particular images among the gigabytes of visual content. But the way they’re shown to us, I’ll bet you can remember them when they come up again later in the plot.

jm-7-uploading-d

Two more images are grabbed before the counter stops. When the upload finishes, the three images are printed out. (In the original film this is shown upside down, so I have rotated the image.)

jm-7-uploading-f-rotated

Tagged

So what are the images for? The script isn’t clear. I suggest that the images are being used as the equivalents of very large random numbers for whatever cryptography scheme protects the data against unauthorised access. Some current day systems use the timing of key presses and mouse movements as a source of randomness because humans simply can’t move their fingers with microsecond precision. Here, the human element makes it impossible to predict exactly which frame is chosen.

Humans also find images much easier to recognise than hundred digit numbers. Anyone who has seen the printout will be able to say whether a particular image is part of the access code or not with a high degree of confidence. In computer systems today, Secure Shell, or ssh, is a widely used encrypted terminal program for secure access to servers. Recent versions of ssh have a β€˜randomart’ capability which shows a small ASCII icon generated from the current cryptographic key to everyone who logs on. If this ASCII icon appears different, this alerts everyone that the server key has been changed.

There’s one potential usability problem with the whole β€œpick three random images” mechanism. The last frame was grabbed when the counter was very close to zero. What would have happened if he had been too slow and missed altogether? Wouldn’t it be more reliable to have the upload system automatically grab the images rather than rely on a human? Chris suggests that maybe it secretly did grab three images that could have used without human input, but privileged the human input since it was more reliably random.

Quick aside: You may be asking, if images would be so wonderful, why aren’t we using them in this way already? It’s because our current security systems need not just very large random numbers, but very large random numbers with particular mathematical properties such as being prime. But let’s cut Johnny Mnemonic some slack,  saying that by 2021 we may have new algorithms.

OK, back to the plot.

-1. Sharing the codes

The access codes are to be faxed from Beijing to Newark, although this gets interrupted by the Yakuza intruders. This is yet another device with unmarked buttons.

jm-7-uploading-g

This device makes the same beeps and screeches as a 1990s analog fax machine. Since we’ll later learn that all the fax messages and phone calls are stored digitally in cyberspace, this must be a skeuomorphism, the old familiar audio tones now serving just as progress indicators.

As with other audio output, the tones allow the user to know that the transmission is proceeding and when it ends without having to pay full attention to the device. On the other hand, there is potential for confusion here as the digital upload is (presumably) much faster. Most current day computer systems could upload three photos, even in high resolution, well before the sequence of tones would complete. Users would most likely wait longer than actually necessary before moving on to their next task.

-2. Washing up

During the upload Johnny clenches his fists and bites his mouthguard. When the upload finishes, he retreats to the bathroom in considerable pain. At one point blood flows from his nose, and he swipes his hand over the tap to wash it down the drain. The bathroom announces that the water temperature is 17 degrees. We’ll come back to this later.

jm-8-bathroom-tap

As Make It So emphasises in the chapter on brain interfaces, there is nothing in our current knowledge to suggest that writing or reading memories to or from a human brain would be painful. On the other hand, we know that information in the brain isthe shape of the neurons in the brain. Who knows what side effects will happen as those neurons are disconnected and reconnected as they need to be? We don’t know, so can’t really say whether it would hurt or not.

-3. Escaping the Yakuza

As mentioned in a prior post, while he is in the bathroom, theΒ motion detector Johnny installed on the hotel door isn’t very effective and the Yakuza break in, kill everyone else, and acquire the second of the three access code images. Johnny escapes with the first image and flies to Newark, North America.Β 

The Groomer

The groomer is a device for sale at the Wookie Planet Trading Post C by local proprietor Saun Dann. (It was named long before the evil pederast sense came to common use.) It looks like a dust brush with an OXO designed, black, easy-grip handle, with a handful of small silver pushbuttons on one side (maybe…three?), and a handful of black buttons on the other (again, maybe three). It’s kind of hard to call it exactly, since this is lower-res than a recompressed I Can Haz Cheezburger jpg.

SWHS-groomer-02

Let’s hear Saun describe it to the vaguely menacing Imperial shopper in his store.

Besides shaving and hair trimming, it’s guaranteed to lift stains off clothing, faces, and hands. Cleans teeth, fingers and toenails, washes eyes, pierces ears, calculates, modulates, syncopates life rhythms, and can repeat the Imperial Penal Codeβ€”all 17 volumesβ€” in half the time of the old XP-21. Just the thing to keep you squeaky clean.

There are so many, many problems with this thing. On every level it’s wretched.

There are lots of product definition problems, of course, (e.g. worse feature bloat than iTunes) but these are issues for scifiproductdesign.com.

And there’s way too much ambiguity in the description, too. For instance, does it (calculate like a calculator), (modulate like a scientific calculator) and (syncopate life rhythms like a metronome)? Or does it (calculate life rhythms) and (modulate life rhythms) and (syncopate life rhythms)? What would any of that mean? Filed for scifiproductmanuals.com.

And is the Imperial Code thing supposed to be a joke? At first you think it’s a dig at this cog of the executive branch for some oppressive legislation enacted by the fascist political regime that gave him his license to menace, haha classic Saun Dann, but then he follows it with an actual performance metric comparison to a prior product version, which is named by model number. So it’s meant to be real? Scificomedywriting.com is still up for grabs, variety show writers from the 70s.

But for the interface questions…where to begin? How do the paucity of controls map to functions? Why are they undifferentiated? Where are the shaving bits? Why are the push controls covering the grip handle?

Which takes us to the darkest aspect of the product: as a single throwaway mention, hidden amongst distraction text, Saun says that it can pierce. Note that with the very poorly placed controls, there are no easy gaurds against accidental activation. It’s almost like it was meant to be a terribly designed, dangerous thing, as liable to leave a gaping hole in your tongue as prepare you for a visit to a dentist.

Because of its terrible industrial design, pointless features, and lawsuit-ready interface, I posit that this object is not something Saun has out to sell to beloved Wookie regulars. It’s something like a Chinese Finger Trap. Cruel shoes. A violent-joke product, only to be brought out when Imperial shoppers patronize the store, in the hopes that they would waste their time on pseudoscience, be forced to confront their own bureaucracy, and ultimately, accidentally pierce themselves in unspeakable places.

Way to subvert, shopkeep.

SWHS-groomer-01

Avengers, assembly!

Avengers-lookatthis.png

When CoulsonΒ hands Tony a case file, it turns out to be an exciting kind of file. For carrying, it’s aΒ large black slab. After Tony grabs it, heΒ grabs the long edges and pulls in opposite directions. One part is a thin translucent screen that fits into an angled slotΒ in the other part,Β in a laptop-like configuration, right down to a built-in keyboard.

The grip edge

The grip edgeΒ of the screen is thicker than the display, so it has a clear, physical affordance as to what part is meant to be gripped and how to pull it free from its casing, and simultaneously what end goes into the base. It’s simple and obvious.Β The ribbing on the grip unfortunately runs parallel to the direction of pull. It would make for a better grip and a better affordance if the grip was perpendicular to the direction of pull. Minor quibble.

I’d be worried about the ergonomics of an unadjustable display. I’d be worried about the display being easily unseated or dislodged. I’d also be worried about the strength of the join. Since there’s no give, enoughΒ force on the display might snap itΒ clean off. But then again this is aΒ world where β€œvibrium steel” exists, soΒ material critiques may not be diegetically meaningful.

Login

Once he pulls the display from the base,Β the screen boops andΒ animated amberΒ arcs spin around the screen, signalling him to login via a rectangular panel on the right hand side of the screen. TonyΒ putsΒ his four fingers in the spot and drags down. A small white graphic confirms his biometrics. As a result,Β a WIMP display appears in grays and amber colors.

Avengers-asset-browser05

Briefing materials

One window on the left hand side shows a keypad, and he enters 1-8-5-4. The keypad disappears and aΒ series of thumbnail imagesβ€”portraits of members ofΒ the Avengers initiativeβ€”appear in its place.Β Pepper asks Tony, β€œWhat is all this?” Tony replies, saying, β€œThis is, uh…” andΒ in a quick gesture, places his ten fingertips on the screen at the portraits, and then throws his hands outward, off the display.

TheΒ portraits slide offscreen to becomeΒ ceiling-height volumetric windows filled with rich media dossiers on Thor, Steve Rogers, and David Banner. There are videos, portraits, schematics, tables of data,Β cellular graphics, and maps. There’s a smaller display near the desktop where the β€œfile” restsΒ about the tesseract. (More on this bit in the next post.)

Briefing.gif

Insert standard complaint here about the eye strain that a translucent displayΒ causes, and the apology that yes, I understand it’s an effective and seemingly high-tech way to show actors and screens simultaneously. But I’d be remiss if I didn’t mention it.

The two-part login shows an understanding of multifactor authenticationβ€”a first in the survey, so props for that. TonyΒ must provide something he β€œis”, i.e. his fingerprints, and something he knows, i.e. the passcode. Only then does the top secret information become available.

I have another standard grouse about the screen providing no affordances that content has an alternate view available, and that a secret gesture summons that view. I’d also ordinarily critiqueΒ the displays for having nearly no visual hierarchy, i.e. no way for your eyes to begin making sense of it, and a lot of pointless-motion noise that pulls your attention in every which way.

But, this beat isΒ about the wonder of the technology, the breadth of information SHIELDΒ in its arsenal, andΒ the surprise of familiar tech becoming epic, so I’m giving itΒ a narrative pass.

Also, OK, Tony’s a universe-class hacker, so maybe he’s just knowledgeable/cocky enough to not need the affordances and turned them off. All that said, in my due diligence:Β Affordances still matter, people.

Wearable soundboard

One of Griff Tannan’’s gang, named Data, wears a sound board on his vest. When Tannan gets a rise out of Marty by asking if he’’s Β“chicken,Β” the gang member underscores the accusation by removing a protective plate over some buttons on his vest and holds one down to play a looping sound clip of a clucking chicken.

BttF_062

That’s pretty awesome, actually. Having all the sounds available at the touch of a button adds a layer of remix culture expressiveness with maximum speed. No modes, no menus, just remembering which sound goes with which button, and his spatial memory is perfect for that. If the buttons were labeled with the sound, or shaped informatively, it might reduce the burden on memory.

BttF_066

You might also reduce the time it takes to respond by removing the protective plate, but Griff is enough of a loose cannon that he might go violent if an accidental sound effect insulted him. So that extra step is probably the safest.

But if we were to really make thisΒ it’s most awesome, you’d make it agentive, such that the plate constantly listened to the conversation for keywords or keyphrases and responded withΒ appropriate snarky sound effects. (Smartphone startup founded around this idea in 3…2…1…)

Sleep Podβ€”Wake Up Countdown

On each of the sleep pods in which the Odyssey crew sleep, there is a display for monitoring the health of the sleeper. It includes some biometric charts, measurements, a body location indicator, and a countdown timer. This post focuses on that timer.

To show the remaining time of until waking Julia, the pod’s display prompts a countdown that shows hours, minutes and seconds. It shows in red the final seconds while also beeping for every second. It pops-up over the monitoring interface.

image03
Julia’s timer reaches 0:00:01.

The thing with pop-ups

We all know how it goes with pop-upsβ€”pop-ups are bad and you should feel bad for using them. Well, in this case it could actually be not that bad.

The viewer

Although the sleep pod display’s main function is to show biometric data of the sleeper, the system prompts a popup to show the remaining time until the sleeper wakes up. And while the display has some degree of redundancy to show the dataβ€”i.e. heart rate in graphics and numbersβ€” the design of the countdown brings two downsides for the viewer.

  1. Position: it’s placed right in the middle of the screen.
  2. Size:Β it’s roughly a quarter of the whole size of the display

Between the two, it partially covers both the pulse graphics and the numbers, which can be vital, i.e. life threateningβ€”information of use to the viewer.

The sleeper

At the same time the display has another user, the sleeper. Since she can’t get back or respond in any way, this display is her only way of communication. As such, the device ought to react at least as well as a person would. So while normally a pop-up should only be used to show important data that the user really must know, this case is different. The pop up is not blindly blocking information, it’s reflecting the user’s priorities at that moment. And it’s for this reason that the timer bears that much visual importance on the screen.

But the display is also a touchscreen, which you can tell from the buttons in the timer. So in case the viewer really needs to see the entire display, it would require putting the timer in a separate mode. But that would require him switch back and forth between modes to get all the data.

image01
When the countdown finishes, the pod slides open. Julia slowly begins to recover consciousness, open her eyes and sits to take a look around the outside.

Rome wasn’t built in 99 hours.

The countdown timer shows the amount of hours, minutes and seconds until the sleeper wakes, counting backwards. We just get to see the timer β€”and hear it beepingβ€” only when the sleep time is ending, so it’s likely a feature to notify any close witness that the pod is about to open.

But what if the sleeper’s biometrics start to get bad? Well, the timer does leave enough room on the screen to leave the bulk of the biometrics data. The device also has a warning for when the sleeper is in CRITICAL condition, but we don’t get to see any in-between modes. It could be helpful if the timer offered some sound cue when the sleeper has some minor issue as well, even if it isn’t as bad. Even something as simple as changing the tone of the beep could do the trick.

Did you notice that the timer has two digits to display hours? That means it can display 99 hours of remaining time. That’s a long time. I’m guessing that the display doesn’t show the countdown with that much time in advance. But in that case, when does it show the timer? If the timer looks to give a hint when a sleeper is about to wake up, you don’t really need to know the amount of hours left. A few minutes’ advance notice is enough.

Kind-of setting the timer.

Although the crew of the Odyssey could probably handle the delta sleep from the onboard computer, the display also offers some functions to control that time. It has three buttons that control the timer:

  • a START button
  • a RESET button
  • a CLEAR button

The timer has two small half-circles both at the top and bottom of the clock. There is a play button. The timer needs to have a way to enter a given duration, and from the mapping of those symbols I’m guessing they could work as adding and subtracting buttons β€”you know, press the top button to add an hour, press the bottom button to reduce an hour. But at the same time the buttons don’t have any labels to convey thatβ€”they lack either a plus symbol on the top or a minus symbol on the bottom. For what it’s worth, the only label they offer is the time magnitude of any pair of digitsβ€”hours, minutes and secondsβ€”on the circles at the bottom. So yeah, I’m close to calling these fuidgets.

The text buttons need some consideration as well. The first two are pretty straightforward if we envision the scenario where the clock timer can be set to any given time. In that case START will start the clock and RESET will put it back to zero, as with any common timer. The odd bit is that there is still a START button while the clock is ticking. In many common timers that same button has two modes that switch according to the state of the timer: starting it when it’s paused and pausing it when it it’s playing. But the missing pause mode or button could have a purpose, perhaps waking the sleeper requires a gradual biological process that can’t be stop once it has began.

image02

There are other problems with the third one, the CLEAR button. Although the label is somewhat misleading, the button probably acts as a way to close the pop-up of the countdown, removing it from the screen. But the real issue is what happens after that. If the user press CLEAR and the pop-up closes, there is no way of knowing if the timer keeps running in the background or if it resets back to zero. This is a major problem.

Anyhow, even if the timer did run in the background it doesn’t have much of a point in this case. I mean, there was no one around to check on Julia while she was in sleep.

A little ramble on Industrial Design

Another interesting aspect of the design of the pods is the way they open. Instead of opening or sliding the cover to one side, as more common doors and hatches, the cover of the pods is divided in the middle like a double-leaf bascule drawbridge. These covers on the pod have a hinge both at the top and bottom, so they turn outside and up of the pod when opening.

Jack releases Julia from the sleep pod.
Jack releases Julia from the sleep pod.

Although it may seem like an overly complicated design, it really shows its advantages when you set it in context. On the Odyssey the sleep pods are placed side by side, alongside the walls of a tube like compartment. There, the area around the center has hatches that lead to other compartments.

image00

Within a space of those characteristics, a cover that opens or slides to the side would bring some problems. As the cover slides, when opening a pod you would be blocking the one next to it. To improve that, you could have a cover that opens up from the top or the bottom. With that you could have more than one pod closing and opening at the same time, but it also comes with drawbacks. Given the length of the pods those doors will probably cover much of the transit area around the compartments of the ship, becoming an obstacle for the movement of the crew.

This is a solution for both problems. The divided doors give plenty of space for the crew to pass through, and as the doors open up they also give room to opening or closing the pods next to each other at the same time.

In case of evasion, BREAK GLASS

  • INT. FEDERATION ADVANCED RESEARCH & DESIGN
  • WOODS
  • You sent for me, sir?
  • ORTEGA
  • Yes I did…I did not, however, invite you to sit, Lieutenant.
  • WOODS
  • Sorry, sir.
  • ORTEGA
  • Are you aware that we have just lost contact with the Rodger Young?
  • WOODS
  • Everyone’s talking about it, sir.
  • ORTEGA
  • Well, I have the video feed from the bridge here. I understand you are the designer of the emergency evasion panel, and the footage raises some fundamental questions about that design. Watch with me now, Lieutenant.
  • ORTEGA PRESSES A BUTTON ON A CONSOLE ON HIS DESK. F/X: VIDEO WALL
StarshipTroopers-BreakGlass-01
  • ORTEGA
  • As you can see, immediately after Captain Deladier issues her order, your panel slides up from a recess in the dash.
  • (He pauses the video)
  • WOODS
  • (After a silence)
  • Is there a question, sir?
  • ORTEGA
  • Why is this panel recessed?
  • WOODS
  • To prevent accidental activation, sir.
  • ORTEGA
  • But it’s an emergency panel. For crisis situations. It takes two incredibly valuable seconds for this thing to dramatically rise up. What else do you imagine that pilot might have done with those extra two seconds?
  • WOODS
  • I…
  • ORTEGA
  • Don’t answer that. It’s rhetorical. Next I need you to not explain this layout. Why aren’t the buttons labeled? What does that second one do, and why does it look exactly the same as the emergency evasion button? Are you deliberately trying to confuse our pilots?
  • (Stares.)
  • OK, now I actually do want you to explain something.
  • (Resuming the video)
  • Why did you cover the panel in glass? Ibanezβ€”and I can’t believe I’m saying thisβ€”punches it.
  • WOODS
  • The glass is there also to prevent accidental activation, sir.
  • ORTEGA
  • But you already covered that with the time-wasting recession. You know she’s likely to have tendon, nerve, and arterial damage now, right? And she’s a pilot, Lieutenant. Without her hands, she’s almost useless to us. And now, in addition to having a giant, peanut-shaped boulder in their face, they’ve got a bridge full of loose glass shards scattered about. Let’s hope the artificial gravity lasts long enough for them to get a broom, or they’re going to be in for some floating laceration ballet.
  • WOODS
  • That would be unfortunate, sir.
  • ORTEGA
  • Damn right. Now honestly I might be of a mind to simply court martial you and treat you to some good old Federation-approved public flogging for Failure to Design. But today may be your lucky day. I believe your elegant design decisions were exacerbated by the pilot’s being something of a drama queen.
  • WOODS
  • The glass was designed to be lifted off, sir.
  • ORTEGA
  • (Resuming the video)
  • Fair enough. My last question…
  • ORTEGA
  • Did I see correctly that all of the lights underneath the engine boost light up all at once? The ones labeled POWER ON? AUTO HOME? NOSE RAM? The ones that don’t have anything to do with the engine boost?
  • WOODS
  • And…and the adjacent green LED, sir.
  • ORTEGA
  • All at once.
  • WOODS
  • Sir.
  • ORTEGA
  • (Sighs)
  • Well, as you might not be able to imagine, we’re moving you. After you collect your belongings you are to report to the Reassignment Office.
  • (He scrubs back and forth over the drone video of the communication tower ripping off.)
  • ORTEGA
  • Out of curiosity, WOODS, what was the last thing you designed as part of my department?
  • WOODS
  • The Buenos Aires Missile Defense System, sir.
  • ORTEGA
  • I’ll look into it. Dismissed.

Reckless undocking

After logging in to her station, Ibanez shares a bit of flirty dialog with mushroom-quaffed Zander Barcalow, and Captain Deladier says, “All right, Ibanez. Take her out.” Ibanez grasps the yoke, pulls back, and the ship begins to pull back from the docking station while still attached by two massive cables. Daladier and Barcalow keep silent but watch as the cables grow dangerously taut. At the last minute Ibanez flips a toggle switch on her panel from 0 to 1 and the cables release.

StarshipT-undocking08

StarshipT-undocking16

There’s a lot of wrong in just this sequence. I mean, I get narratively what’s happening here: Check her out, she’s a badass maverick (we’re meant to think). But, come on…

  1. Where is the wisdom of letting a Pilot Trainee take the helm on her first time ever aboard a vessel? OK. Sorry. This is an interface blog. Ignore that one.
  2. The 1 and 0 symbols are International Electrotechnical Commission 60417 standards for on and off, respectively. How is the cable’s detachment caused by something turning on? If it was magnetic, shouldn’t you turn the magnetism off to release the cables?
  3. Why use the symbols for ON and OFF for an infrequent, specific task? Shouldn’t this be reserved for a kill switch or power to the station or something major? Or shouldn’t it bear a label reading “Power Cable Magnets” or something to make it more intelligible?
  4. Why is there no safety mechanism for this switch? A cover? A two-person rule? A timed activation? It’s fairly consequential. The countersink doesn’t feel like it’s enough.
  5. Where is the warning klaxon to alert everyone to this potentially disastrous situation?
  6. Why isn’t she dishonorably discharged the moment she started to maneuver the ship while it was still attached to the dock? Oh, shit. Sorry. Interfaces. Right. Interfaces.

Wearable Control Panels

As I said in the first post of this topic, exosuits and environmental suits are out of the definition of wearable computers. But there is one item commonly found on them that can count as wearable, and that’s the forearm control panels. In the survey these appear in three flavors.

Just Buttons

Fairly late in sci-fi they acknowledged the need for environmental suits, and acknowledged the need for controls on them. The first wearable control panel belongs to the original series of Star Trek, “The Naked Time” S01E04. The sparkly orange suits have a white cuff with a red and a black button. In the opening scene we see Mr. Spock press the red button to communicate with the Enterprise.

This control panel is crap. The buttons are huge momentary buttons that exist without a billet, and would be extremely easy to press accidentally. The cuff is quite loose, meaning Spock or the redshirt have to fumble around to locate it each time. Weeeeaak.

Star Trek (1966)

TOS_orangesuit

Some of these problems were solved when another WCP appeared 3 decades later in the the Next Generation movie First Contact.

Star Trek First Contact (1996)

ST1C-4arm

This panel is at least anchored, and located in places that could be located fairly easily via proprioception. It seems to have a facing that acts as a billet, and so might be tough to accidentally activate. It’s counter to its wearer’s social goals, though, since it glows. The colored buttons help to distinguish it when you’re looking at it, but it sure makes it tough to sneak around in darkness. Also, no labels? No labels seems to be a thing with WCPs since even Pixar thought it wasn’t necessary.

The Incredibles (2004)

Admittedly, this WCP belonged to a villain who had no interest in others’ use of it. So that’s at least diegetically excusable.

TheIncredibles_327

Hey, Labels, that’d be greeeeeat

Zipping back to the late 1960s, Kubrick’s 2001 nailed most everything. Sartorial, easy to access and use (look, labels! color differentiation! clustering!), social enough for an environmental suit, billeted, and the inputs are nice and discrete, even though as momentary buttons they don’t announce their state. Better would have been toggle buttons.

2001: A Space Odyssey (1968)

2001-spacesuit-021

Also, what the heck does the “IBM” button do, call a customer service representative from space? Embarrassing. What’s next, a huge Mercedez-Benz logo on the chest plate? Actually, no, it’s a Compaq logo.

A monitor on the forearm

The last category of WCP in the survey is seen in Mission to Mars, and it’s a full-color monitor on the forearm.

Mission to Mars

M2Mars-242

This is problematic for general use and fine for this particular application. These are scientists conducting a near-future trip to Mars, and so having access to rich data is quite important. They’re not facing dangerous Borg-like things, so they don’t need to worry about the light. I’d be a bit worried about the giant buttons that stick out on every edge that seem to be begging to be bumped. Also I question whether those particular buttons and that particular screen layout are wise choices, but that’s for the formal M2M review. A touchscreen might be possible. You might think that would be easy to accidentally activate, but not if it could only be activated by the fingertips in the exosuit’s gloves.

Wearableness

This isn’t an exhaustive list of every wearable control panel from the survey, but a fair enough recounting to point out some things about them as wearable objects.

  • The forearm is a fitting place for controls and information. Wristwatches have taken advantage of this for…some time. πŸ˜›
  • Socially, it’s kind of awkward to have an array of buttons on your clothing. Unless it’s an exosuit, in which case knock yourself out.
  • If you’re meant to be sneaking around, lit buttons are counterindicated. As are extruded switch surfaces that can be glancingly activated.
  • The fitness of the inputs and outputs depend on the particular application, but don’t drop the understandability (read: labels) simply for the sake of fashion. (I’m looking at you, Roddenberry.)