Brain Upload

Once Johnny has installed his motion detector on the door, the brain upload can begin.

3. Building it

Johnny starts by opening his briefcase and removing various components, which he connects together into the complete upload system. Some of the parts are disguised, and the whole sequence is similar to an assassin in a thriller film assembling a gun out of harmless looking pieces.

jm-6-uploader-kit-a

It looks strange today to see a computer system with so many external devices connected by cables. We’ve become accustomed to one piece computing devices with integrated functionality, and keyboards, mice, cameras, printers, and headphones that connect wirelessly.

Cables and other connections are not always considered as interfaces, but “all parts of a thing which enable its use” is the definition according to Chris. In the early to mid 1990s most computer user were well aware of the potential for confusion and frustration in such interfaces. A personal computer could have connections to monitor, keyboard, mouse, modem, CD drive, and joystick – and every single device would use a different type of cable. USB, while not perfect, is one of the greatest ever improvements in user interfaces. Continue reading

Advertisements

Middle class oppression

Laborers of the Upper City have their own machines to worry about.

Josaphat feels stress while monitoring figures.

One of Joh’s assistants, Josaphat, has a similarly difficult task. He stands at a tall panel where lit symbols fall quickly and randomly down one of six tall, thin screens. He has to transcribe them (and possibly perform calculations with them) in one of three different books.

Josaphat turns his station off.

The only sensible part of this setup is the mechanism for shutting it down. Given the time pressure its operator is under, it could be disastrous if a single switch was accidentally touched. Instead, to turn it off Josephat must stretch his arms to reach two distant buttons. Touching them both shuts down the station. This seems especially prescient when considering that similar constraints informed the design of the familiar CTRL-ALT-DELETE key sequence for Windows operating systems.