Questioning Invisibility Please share

advertisement
Questioning Invisibility
The MIT Faculty has made this article openly available. Please share
how this access benefits you. Your story matters.
Citation
Buechley, L. “Questioning Invisibility.” Computer 43.4 (2010): 8486. © Copyright 2010 IEEE
As Published
http://dx.doi.org/10.1109/MC.2010.114
Publisher
Institute of Electrical and Electronics Engineers
Version
Final published version
Accessed
Wed May 25 18:22:39 EDT 2016
Citable Link
http://hdl.handle.net/1721.1/59341
Terms of Use
Article is made available in accordance with the publisher's policy
and may be subject to US copyright law. Please refer to the
publisher's site for terms of use.
Detailed Terms
IN V ISIBL E C OMP U TING
Questioning Invisibility
Leah Buechley, MIT Media Lab
Should invisibility be the guiding design goal for ubiquitous
computing?
A good tool is an invisible tool. By invisible, I mean that the tool does not intrude on your consciousness; you focus on the task,
not the tool.
– Mark Weiser
T
he invisibility of today’s
technology is often a
ble s sing. My laptop
can be used as a word
processor, TV, and stereo without
changing shape, and I’m grateful
that I don’t have to think about transistors, compilers, and operating
systems while I use it. However, is
invisibility always a good thing?
Figure 1. Crashes and errors make the invisible technologies underlying our lives
alarmingly visible.
84
COMPUTER
Published by the IEEE Computer Society
Should it be the guiding design goal
for ubiquitous computing?
WHEN INVISIBILITY FAILS
Benjamin Mako Hill has been
examining instances where the invisibility of technology breaks down.
His website, revealingerrors.com,
documents occasions when a crash
or error makes one of the invisible
technologies underlying our lives
alarmingly visible, forcing us to confront its technological innards. Figure
1 shows a few examples.
The crashed ATM with its exposed
Windows desktop and the GPS system
that locates itself in the ocean are
self-explanatory errors, but the third
example requires some elucidation.
The text at the top of the webpage
should read “Gay eases into 100 final
at Olympic trials,” Gay being the
surname of athlete Tyson Gay. This
strange headline reveals the fact that
the website posting the news feed,
a conservative network called One
News Now, uses a program to adjust
the language of AP news stories. Here
we see that part of their program
replaces instances of the word “gay”
with the word “homosexual.”
Hill argues that such breakdowns
0018-9162/10/$26.00 © 2010 IEEE
Authorized licensed use limited to: MIT Libraries. Downloaded on April 26,2010 at 20:56:50 UTC from IEEE Xplore. Restrictions apply.
Figure 2. The LilyPad Arduino toolkit consists of a set of sewable electronic modules that users can stitch together with electrically
conductive thread to make interactive textile-based computers.
aren’t necessarily bad. Though
inconvenient and frustrating, they
can reveal the inelegance, fragility,
and questionable practices behind
technological systems. I can use that
information to make more informed
decisions; I might very well change
banks if I knew more about my favorite ATM’s operating system.
Does this mean we should start
designing error-prone systems? Of
course not. But it does raise a question about the narrow design goal of
invisibility. Systems that vanish into
the background aren’t inherently
good ones. The examples in Figure 1
are troubling demonstrations of some
of the things invisibility can hide.
LEVERAGING VISIBILITY
FOR EDUCATION
The errors documented on Hill’s
website are funny, fascinating, and
enlightening; consequently, they
provide wonderful opportunities for
teaching and learning.
Imagine the curiosity and delight
that an encounter with one of these
broken systems could inspire in a
young person. There are two facets
to this appeal. First, the errors are
engaging—they surprise us and force
us to notice technology we might
have otherwise ignored. Second, they
introduce legibility to technology—
they reveal interesting information
about how it works.
In the research group I direct at
the MIT Media Lab (hlt.media.mit.
edu), we design educational technology that is deliberately engaging and
legible. We exploit these properties
to get students excited about technology. Our particular approach focuses
on using new and unusual physical
materials to create compelling and
comprehensible systems.
For example, during the past several years we have been working
in the emerging field of electronic
textiles, or “e-textiles,” integrating
electronics, computers, and textiles.
We began by tackling a fundamental
engineering challenge: How do you
attach computers to fabric? Once we
had developed robust solutions to this
problem, we focused on making the
domain accessible to students.
The result of our efforts was the
LilyPad Arduino (L. Buechley et al.,
“The LilyPad Arduino: Using Computational Textiles to Investigate
Engagement, Aesthetics, and Diversity
in Computer Science Education,” Proc.
26th Ann. SIGCHI Conf. Human Factors
in Computing Systems, ACM Press,
2008, pp. 423-432). As the leftmost
image in Figure 2 shows, this toolkit
consists of a set of sewable electronic
modules—similar in spirit to Lego
Mindstorm modules—that users can
stitch together with electrically conductive thread to make interactive
textile-based computers.
In a series of courses and workshops, we found that this very visible
new technology could uniquely capture the imagination of teenagers
and teach them the fundamentals of
computer science and electrical engineering. Interestingly, young women
were especially excited about this
blend of textiles and computing. The
other two images in Figure 2 show a
young woman from one of our workshops first constructing and then
modeling her course project, an interactive light-up jacket with an ambient
thermometer.
We’r e now e x p a n d i n g t h i s
approach to another unusual material, paper—exploring how we can
blend paper and paint with computers and electronics. We’ve designed a
paper computing kit that consists of
magnetic sensors, actuators, microcontrollers, and wireless devices;
ferrous paper, to which the modules
stick; and a jar of conductive paint,
which is used to connect the modules across the paper. Students can
use the kit to paint beautiful, functional electronic devices onto paper.
Figure 3 shows images of a prototype kit and a construction example:
an electronic pop-up book built by
Jie Qi, an undergraduate researcher
in our lab.
We’ve just begun to hold workshops
to explore how we might employ this
kit to teach embedded computing (J. Qi
APRIL 2010
Authorized licensed use limited to: MIT Libraries. Downloaded on April 26,2010 at 20:56:50 UTC from IEEE Xplore. Restrictions apply.
85
IN V ISIBL E C OMP U TING
The Living Wall is a flexible ubicomp system. However, it also
functions as a decorative element
in a home. Like the other examples
mentioned here, it wasn’t designed
to be invisible; it elicits and rewards
attention.
I
Figure 3. Paper computing kit. Left: Prototype kit. Right: Electronic popables.
and L. Buechley, “Electronic Popables:
Exploring Paper-Based Computing
through an Interactive Pop-up Book,”
Proc. 4th Int’l Conf. Tangible, Embedded, and Embodied Interaction, ACM
Press, pp. 121-128).
Technologies like these—ones that,
at their best, captivate, empower,
and educate people—stand in direct
opposition to ubicomp’s tenet of
invisibility; the kits, and often the
devices constructed with them as
well, are intentionally visible objects
that reveal the inner workings of technology and explicitly require users’
time and attention.
Other researchers have also noted
this conflict between invisibility and
education (M. Eisenberg et al., “Invisibility Considered Harmful: Revisiting
Traditional Principles of Ubiquitous
Computing in the Context of Education,” Proc. 4th IEEE Int’l Workshop
Wireless, Mobile, and Ubiquitous Technology in Education, IEEE CS Press, pp.
103-110; Y. Rogers, “Moving On from
Weiser’s Vision of Calm Computing:
Engaging UbiComp Experiences,”
Proc. 8th Int’l Conf. Ubiquitous Computing, LNCS 4206, Springer, 2006, pp.
404-421).
INVISIBILITY, VISIBILITY,
AND DESIGN
In our lives there are objects we
ignore and objects we treasure. Some
vanish into the background and stay
there and others please, amuse,
86
and comfort us. There are the forgotten paper clips, printers, and
towels, and the beloved dining room
tables, sports uniforms, and jewelry. Why should ubicomp—or any
other computing discipline, for that
matter—consign itself to the ignored,
invisible realm?
Our research group strives to build
systems that fit into people’s aesthetic
and emotional lives as much as their
technological ones. As Figures 2 and 3
suggest, exploring the aesthetic possibilities of technology provides us with
new and unusual ways to excite and
engage students. We also investigate
aesthetic and emotional dimensions
when we develop systems that are
less explicitly educational.
A recent project along these lines
is a unique piece of wallpaper that
we constructed with our paper computing kit. The Living Wall is a flat
surface built out of ferrous paint,
conductive paint, traditional paint,
and electronics to which our paper
computing modules can be attached.
With its wide range of attachable
components, the Living Wall can provide lighting, sense information about
its environment, communicate with
other devices like computers and
phones, and act as a large-scale input
device. The News Brief “Researchers
Build a Wall That Acts Like a Remote
Control” on p. 18 has more information on the system and an illustration
of its use.
nvisibility is a narrow design
goal. It’s not necessarily a bad
one, but it doesn’t capture the
full range of technological or creative
possibilities. If we as computer scientists and engineers only strive to
build invisible systems, we’ll neglect
to build important technology that is
educational, engaging, and beautiful.
We should expand our focus and our
rhetoric.
Leah Buechley is an assistant professor and AT&T Career Development
Professor of Media Arts and Sciences
at MIT Media Lab, where she also
directs the High-Low Tech research
group. Contact her at leah@media.
mit.edu.
Editor: Albrecht Schmidt, Institute for
Computer Science and Business Information
Systems, University of Duisburg-Essen,
Germany; albrecht.schmidt@gmail.com
Selected CS articles and columns
are available for free at
http://ComputingNow.computer.org.
Join the
IEEE
Computer
Society
www.computer.org
COMPUTER
Authorized licensed use limited to: MIT Libraries. Downloaded on April 26,2010 at 20:56:50 UTC from IEEE Xplore. Restrictions apply.
Download