Colloquium Archive

Informal Tools For Designing Anywhere, Anytime, Anydevice User Interfaces

James A. Landay, UC Berkeley

11/21/2002

We are now entering the era of pervasive computing, an era where people will access information and services anywhere, anytime, and from a wide variety of devices. The challenge for researchers and practitioners is how to support the design of user interfaces that will empower people to engage in these interactions easily and efficiently. Our work has been in creating design tools that support the best practices of user-centered design. Such practices include the informal techniques used during the early stages of design, such as sketching and "faking" interactions using Wizard of Oz techniques to test early designs. In this talk we will argue that tools with informal user interfaces best support these practices. Informal user interfaces support natural human input, such as speech and writing, while minimizing recognition and transformation of the input. These interfaces that document, rather than transform, better support a designer's flow state. Unrecognized input embraces nuanced expression and suggests a malleability of form that is critical for activities such as early-stage design. We will illustrate this by examining informal tools wehave created for designing information architectures and web sites, speech-based userinterfaces, and anytime, anywhere user interfaces that take advantage of a variety of modes of input and output on a range of devices.

Computer Forensics: Collecting Evidence From A Digital Crime Scene

Todd Hancock, Northern California Computer Crimes Task Force, Napa County Sheriff's Department

12/05/2002

A computer forensic examiner approaches his "crime scene" in much the same way that a criminalist examines the scene of a homicide; by applying clear, well defined methodologies and procedures. Computers and digital media are increasingly involved in unlawful activities. The computer may be contraband, fruits of the crime, a tool of the offense, or a storage container holding evidence of the offense. Images, audio, text and other data on these media are easily altered or destroyed. The "art" of Computer Forensics involves the preservation, identification, extraction, interpretation and documentation of computer data. Computers and related evidence range from the mainframe computer to the pocket-sized personal data assistant to the floppy diskette, CD or other smaller storage media.

Backup And Recovery, As Part Of Disaster Recovery

Lynnwood Brown

12/12/2002

Disaster recovery and business Continuity is more than just marketing spin. Its that your doors are open 24x7. Its doing the support to make sure that your customers are serviced to the standards they expect. Its about protecting your revenue. Its protecting your investment. Creating a business continuity plan is far from a trivial exercise. How do you ensure that your disaster recovery plan meets your needs? Equally fundamentally, do you know what your resource/service dependencies are and what their time criticalities are? Risk analysis is inextricably linked with disaster recovery. Assessment of the risks which may lead to disaster is essential in the determination of what controls are appropriate to the situation. The presentation will address the backup and recovery aspects of disaster recovery focusing on some of the current solutions for implementing a backup and recovery solution forrestoring IT services.

Software Technologies For Wireless Applications

David Ni, Crescentec and Memes Technology, Danville

02/13/2003

The continuous growth of wireless applications such as cellular phones and wireless LAN has been pushing the vendors searching more new technologies for service deployment, feature enhancement and cost reduction. This talk will focus on some ofsoftware technologies, which are important to different stages of wireless application development: from RF IC design, telecom/wireless standard/architecture, and service infrastructure. We will discuss some challenges in each area and the related computing disciplines.

A Brush With Fame, Digital Artwork And Dozens Ofdeadly Weapons

Bill Nelson, Petaluma

02/20/2003

A chronicle of the journey of a non-digital artist into the world of bits, bytes and bus. Digital imagery has changed our perception of the world in many ways, in particular how we SEE it. How do we translate from an analog world into the digital realm? Even our actors may become digital representations. How do we come to relate in a meaningful way with a world consisting of ephemeral differences in voltage andgenerated images? Learning to live with and love an interactive world within a Graphical User Interface.

Pages