The transition from Beijing to the Newark copyshop is more involved. After he travels around a bit, he realizes he needs to be looking back in Newark. He “rewinds” using a pull gesture and sees the copyshop’s pyramid. First there is a predominantly blue window that unfolds as if it were paper.
And then the copyshop initial window expands. Like the Beijing hotel, this is a floor plan view, but unlike the hotel it stays two dimensional. It appears that cyberspace works like the current world wide web, with individual servers for each location that can choose what appearance to present to visitors.
Johnny again selects data records, but not with a voice command. The first transition is a window that not only expands but spins as it does so, and makes a strange jump at the end from the centre to the upper left.
Once again Johnny uses the two-handed expansion gesture to see the table view of the records.Continue reading →
Marty Sr. answers a call from a shady business colleague shortly after coming home. He takes the call in the den on the large video screen there. As he approaches the screen, he sees a crop of a Renoir painting, Dance at La Moulin de la Galette, with a blinking legend INCOMING CALL along the bottom. When he answers it, the Renoir shrinks to a corner of the screen, revealing the live video feed with his correspondent. During the conversation, the Renoir disappears, and text appears near the bottom of the screen providing reminders about the speaker. This appears automatically, with no prompting from Marty Sr.
Needles, Douglas J. Occupation: Sys Operations Age: 47 Birthday: August 6, 1968 Address: 88 Oriole Rd, A6t Wife: Lauren Anne Children: Roberta, 23 Amy, 20 Food Prefence: Steak, Mex Food Dislike: Fish, Tuna Drinks: Scotch, Beer Hobbies: Avid Basketball Fan Sports: Jogging, Slamball, Tennis Politics: None
This is an augmented reality teleconference, as mentioned in Chapter 8 of Make It So: Interaction Design Lessons from Science Fiction. See more information in that chapter. In short, it’s a particularly good example of one type of augmentation that is very useful for people having to interact with networks of people much larger than Dunbar’s number equips us for. Unfortunately, the information appears in a distracting scroll across the bottom, and is not particularly pertinent to the conversation, so could benefit from a bit of context awareness or static high-resolution display to be really useful.Continue reading →
The first computer interface we see in the film occurs at 3:55. It’s an interface for housing and monitoring the tesseract, a cube that is described in the film as “an energy source” that S.H.I.E.L.D. plans to use to “harness energy from space.” We join the cube after it has unexpectedly and erratically begun to throw off low levels of gamma radiation.
The harnessing interface consists of a housing, a dais at the end of a runway, and a monitoring screen.
Fury walks past the dais they erected just because.
The housing & dais
The harness consists of a large circular housing that holds the cube and exposes one face of it towards a long runway that ends in a dais. Diegetically this is meant to be read more as engineering than interface, but it does raise questions. For instance, if they didn’t already know it was going to teleport someone here, why was there a dais there at all, at that exact distance, with stairs leading up to it? How’s that harnessing energy? Wouldn’t you expect a battery at the far end? If they did expect a person as it seems they did, then the whole destroying swaths of New York City thing might have been avoided if the runway had ended instead in the Hulk-holding cage that we see later in the film. So…you know…a considerable flaw in their unknown-passenger teleportation landing strip design. Anyhoo, the housing is also notable for keeping part of the cube visible to users near it, and holding it at a particular orientation, which plays into the other component of the harness—the monitor.
The garbage collector who is inadvertently working for Ghost Hacker takes a break during his work to access the network by public terminal. The terminal is a small device, about a third of a meter across, mounted on a pole about a meter high and surrounded by translucent casing to protect it from the elements and keep the screen private. Parts are painted red to make it identifiable in the visual chaos of the alleyway.
After pressing a series of buttons and hearing corresponding DTMF, or Touch-Tones, he inserts a card into a horizontal slot labeled “DATA” in illuminated green letters. The card is translucent with printed circuitry and a few buttons. The motorized card reader pulls the card in, and then slides it horizontally along a wide slot while an illuminated green label flashes that it is INSPECTING the card. When it is halfway along this horizontal track, a label on the left illuminates COMPRESS.
On a multilayer, high-resolution LCD screen above, graphics announce that it is trying to CONNECT and then providing ACCESS, running a section of the “cracking software” that the garbage collector wishes to run. After he is done with ACCESS, he removes the card and gets back to work.
From a certain perspective, there’s nothing wrong with this interaction. He’s able to enter some anonymous information up front, and then process the instructions on the card. It’s pretty ergonomic for a public device. It provides him prompts and feedback of process and status. He manages its affordances and though the language is cryptic to us, he seems to have no problem.
Where the terminal fails is that it gives him no idea that it’s doing something more than he realizes, and that something more is quite a bit more illegal than he’s willing to risk. Had it given him some visualization of what was being undertaken, he might have stopped immediately, or at least have returned to his “friend” to ask what was going on. Of course the Ghost Hacker is, as his name says, a powerful hacker, and might have been able to override the visualization. But with no output, even novice hackers could dupe the unknowing because they are uninformed.
Later in the scene General Staedert orders a “thermonucleatic imaging.” The planet swallows it up. Then Staedert orders an “upfront loading of a 120-ZR missile” and in response to the order, the planet takes a preparatory defensive stance, armoring up like a pillbug. The scanner screens reflect this with a monitoring display.
In contrast to the prior screen for the Gravity (?) Scan, these screens make some sense. They show:
A moving pattern on the surface of a sphere slowing down
clear Big Label indications when those variables hit an important threshold, which is in this case 0
A summary assessment, “ZERO SURFACE ACTIVITY”
A key on the left identifying what the colors and patterns mean
Some sciency scatter plots on the right
The majority of these would directly help someone monitoring the planet for its key variables.
Though these are useful, it would be even more useful if the system would help track these variables not just when they hit a threshold, but how they are trending. Waveforms like the type used in medical monitoring of the “MOVEMENT LOCK,” “DYNAMIC FLOW,” and “DATA S C A T” might help the operator see a bit into the future rather than respond after the fact.
The first bit of human technology we see belongs to the Federation of Territories, as a spaceship engages the planet-sized object that is the Ultimate Evil. The interfaces are the screen-based systems that bridge crew use to scan the object and report back to General Staedert so he can make tactical decisions.
We see very few input mechanisms and very little interaction with the system. The screen includes a large image on the right hand side of the display and smaller detailed bits of information on the left. Inputs include
Rows of backlit modal pushbuttons adjacent to red LEDs
The operator of the first of these screens touches one of the pushbuttons to no results. He then scrolls the trackball downward, which scrolls the green text in the middle-left part of the screen as the graphics in the main section resolve from wireframes to photographic renderings of three stars, three planets, and the evil planet in the foreground, in blue.
The main challenge with the system is what the heck is being visualized? Professor Pacoli says in the beginning of the film that, “When the three planets are in eclipse, the black hole, like a door, is open.” This must refer to an unusual, trinary star system. But if that’s the case, the perspective is all wrong on screen.
Plus, the main sphere in the foreground is the evil planet, but it is resolved to a blue-tinted circle before the evil planet actually appears. So is it a measure of gravity and event horizons of the “black hole?” Then why are the others photo-real?
Where is the big red gas giant planet that the ship is currently orbiting? And where is the ship? As we know from racing game interfaces and first-person shooters, having an avatar representation of yourself is useful for orientation, and that’s missing.
And finally, why does the operator need to memorize what “Code 487” is? That places a burden on his memory that would be better used for other, more human-value things. This is something of a throw-away interface, meant only to show the high-tech nature of the Federated Territories and for an alternate view for the movie’s editor to show, but even still it presents a lot of problems.