The Memory Doubler

In Beijing, Johnny steps into a hotel lift and pulls a small package out his pocket. He unwraps it to reveal the “Pemex MemDoubler”.

jm-4-memdoubler-a

Johnny extends the cable from the device and plugs it into the implant in his head. The socket glows red once the connection is made.

jm-4-memdoubler-b-adjusted
jm-4-memdoubler-c-adjusted

Analysis: The jack

The jack looks like an audio plug, and like most audio plugs is round and has no coronal-orientation requirement. It also has a bulbous rather than pointed tip. Both of these are good design, as Johnny can’t see the socket directly and while accidentally poking yourself with a headphone style point is unlikely to be harmful, it would certainly be irritating.

The socket’s glow would be a useful indicator that the thing is working, but Johnny can’t see it! Probably these sockets and jacks are produced and used for other devices as well, as red status lights are common in this world.

There are easier and more convenient fictional brain plug interfaces, such as the neck plugs previously discussed on this website for Ghost In The Shell. But Johnny doesn’t want his implant to be too obvious, so this not so convenient plug may be a deliberate choice. Perhaps he tells inquisitive people that it’s for his Walkman.

Analysis: The device

The product name got a few chuckles from audiences in the 1990s, as the name is similar to a common classic Macintosh extension at the time, the Connectix RAM Doubler. This applied in-memory lossless data compression techniques to allow more or larger programs to run within the existing RAM.

The MemDoubler is apparently a software or firmware updater, modifying Johnny’s implant to use brain tissue twice as efficiently as before. It has voice output, again a slightly artificial sounding but not unpleasant voice. This announces that Johnny’s current capacity is 80 gigabytes. As the update is applied, a glowing progress bar gradually fills until the voice announces the new capacity of 160G.

jm-4-memdoubler-d

(Going from 80G to 160G seems quaint today. But we should remember that the value of a mnemonic courier is secrecy, not quantity.)

Why does the MemDoubler need voice output? For such a simple task, the progress bar and a three digit numeric counter would seem adequate. But if there are complications—which for something wired into the brain might have an all too literal meaning for “fatal error”—a voice announcement would be able to include much more detail about the problem, or even alert bystanders if Johnny is rendered unconscious by the problem. (Given how current software installers operate, Johnny is fortunate that the MemDoubler did not insist on reciting the entire end user license agreement and warranty before the update could start.) Maybe the visual should be the default (to respect his professional need for secrecy), and the voice announcement adopted in an alert mode.

It’s also interesting that Johnny installs this immediately before he needs it, in the lift that is taking him to the hotel room where he will receive the data to be stored. Suppose someone else had been in the lift with him? In this world of routine body implants doubling your memory is probably not a crime, but at the time of writing diabetics will inject themselves in private even though that is harmless and necessary. Perhaps body-connected technology will be common enough in 2021 that public operation is considered normal, just as we have become accustomed to mobile phone conversations being carried out in public.

Internet 2021

The opening shot of Johnny Mnemonic is a brightly coloured 3D graphical environment. It looks like an abstract cityscape, with buildings arranged in rectangular grid and various 3D icons or avatars flying around. Text identifies this as the Internet of 2021, now cyberspace.

Internet 2021 display

Strictly speaking this shot is not an interface. It is a visualization from the point of view of a calendar wake up reminder, which flies through cyberspace, then down a cable, to appear on a wall mounted screen in Johnny’s hotel suite. However, we will see later on that this is exactly the same graphical representation used by humans. As the very first scene of the film, it is important in establishing what the Internet looks like in this future world. It’s therefore worth discussing the “look” employed here, even though there isn’t any interaction.

Cyberspace is usually equated with 3D graphics and virtual reality in particular. Yet when you look into what is necessary to implement cyberspace, the graphics really aren’t that important.

MUDs and MOOs: ASCII Cyberspace

People have been building cyberspaces since the 1980s in the form of MUDs and MOOs. At first sight these look like old style games such as Adventure or Zork. To explore a MUD/MOO, you log on remotely using a terminal program. Every command and response is pure text, so typing “go north” might result in “You are in a church.” The difference between MUD/MOOs and Zork is that these are dynamic multiuser virtual worlds, not solitary-player games. Other people share the world with you and move through it, adventuring, building, or just chatting. Everyone has an avatar and every place has an appearance, but expressed in text as if you were reading a book.

guest>>@go #1914
Castle entrance
A cold and dark gatehouse, with moss-covered crumbling walls. A passage gives entry to the forbidding depths of Castle Aargh. You hear a strange bubbling sound and an occasional chuckle.

Obvious exits:
path to Castle Aargh (#1871)
enter to Bridge (#1916)

Most impressive of all, these are virtual worlds with built-in editing capabilities. All the “graphics” are plain text, and all the interactions, rules, and behaviours are programmed in a scripting language. The command line interface allows the equivalent of Emacs or VI to run, so the world and everything in it can be modified in real time by the participants. You don’t even have to restart the program. Here a character creates a new location within a MOO, to the “south” of the existing Town Square:

laranzu>>@dig MyNewHome
laranzu>> @describe here as “A large and spacious cave full of computers”
laranzu>> @dig north to Town Square

The simplicity of the text interfaces leads people to think these are simple systems. They’re not. These cyberspaces have many of the legal complexities found in the real world. Can individuals be excluded from particular places? What can be done about abusive speech? How offensive can your public appearance be? Who is allowed to create new buildings, or modify existing ones? Is attacking an avatar a crime? Many 3D virtual reality system builders never progress that far, stopping when the graphics look good and the program rarely crashes. If you’re interested in cyberspace interface design, a long running textual cyberspace such as LambdaMOO or DragonMUD holds a wealth of experience about how to deal with all these messy human issues.

So why all the graphics?

So it turns out MUDs and MOOs are a rich, sprawling, complex cyberspace in text. Why then, in 1995, did we expect cyberspace to require 3D graphics anyway?

The 1980s saw two dimensional graphical user interfaces become well known with the Macintosh, and by the 1990s they were everywhere. The 1990s also saw high end 3D graphics systems becoming more common, the most prominent being from Silicon Graphics. It was clear that as prices came down personal computers would soon have similar capabilities.

At the time of Johnny Mnemonic, the world wide web had brought the Internet into everyday life. If web browsers with 2D GUIs were superior to the command line interfaces of telnet, FTP, and Gopher, surely a 3D cyberspace would be even better? Predictions of a 3D Internet were common in books such as Virtual Reality by Howard Rheingold and magazines such as Wired at the time. VRML, the Virtual Reality Markup/Modeling Language, was created in 1995 with the expectation that it would become the foundation for cyberspace, just as HTML had been the foundation of the world wide web.

Twenty years later, we know this didn’t happen. The solution to the unthinkable complexity of cyberspace was a return to the command line interface in the form of a Google search box.

Abstract or symbolic interfaces such as text command lines may look more intimidating or complicated than graphical systems. But if the graphical interface isn’t powerful enough to meet their needs, users will take the time to learn how the more complicated system works. And we’ll see later on that the cyberspace of Johnny Mnemonic is not purely graphical and does allow symbolic interaction.

Ghost-hacking by public terminal

GitS-phonecall-01

The garbage collector who is inadvertently working for Ghost Hacker takes a break during his work to access the network by public terminal. The terminal is a small device, about a third of a meter across, mounted on a pole about a meter high and surrounded by translucent casing to protect it from the elements and keep the screen private. Parts are painted red to make it identifiable in the visual chaos of the alleyway.

GitS-phonecall-02

After pressing a series of buttons and hearing corresponding DTMF, or Touch-Tones, he inserts a card into a horizontal slot labeled “DATA” in illuminated green letters. The card is translucent with printed circuitry and a few buttons. The motorized card reader pulls the card in, and then slides it horizontally along a wide slot while an illuminated green label flashes that it is INSPECTING the card. When it is halfway along this horizontal track, a label on the left illuminates COMPRESS.

On a multilayer, high-resolution LCD screen above, graphics announce that it is trying to CONNECT and then providing ACCESS, running a section of the “cracking software” that the garbage collector wishes to run. After he is done with ACCESS, he removes the card and gets back to work.

GitS-phonecall-06

From a certain perspective, there’s nothing wrong with this interaction. He’s able to enter some anonymous information up front, and then process the instructions on the card. It’s pretty ergonomic for a public device. It provides him prompts and feedback of process and status. He manages its affordances and though the language is cryptic to us, he seems to have no problem.

Where the terminal fails is that it gives him no idea that it’s doing something more than he realizes, and that something more is quite a bit more illegal than he’s willing to risk. Had it given him some visualization of what was being undertaken, he might have stopped immediately, or at least have returned to his “friend” to ask what was going on. Of course the Ghost Hacker is, as his name says, a powerful hacker, and might have been able to override the visualization. But with no output, even novice hackers could dupe the unknowing because they are uninformed.