blue gene
DESCRIPTION
Blue geneTRANSCRIPT
11
What ComesWhat ComesNextNext ??
Tim FininUniversity of Maryland,
Baltimore County
February 17, 2004
http://ebiquity.umbc.edu/v2.1/resource/html/id/16/
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
2
CaveatCaveat
““It's tough to make predictions, It's tough to make predictions, especially about the future.”especially about the future.”-- Yogi Berra -- Yogi Berra
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
3
(0) Opening thoughtsSome current research at UMBCSome current research at UMBC
(1)(1) Pervasive computingPervasive computing(2)(2) Wearable computingWearable computing( ) Intelligent agents( ) Intelligent agents( ) The semantic web( ) The semantic web
(3) Final thoughts
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
4
IT EvolutionIT Evolution
1970 1980 1990 2000
Personalcomputer
Internet
Web
ecommerce
During the past 20 years, computers have engaged thegeneral population and made a difference in our lives.
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
5
IT EvolutionIT Evolution
The possibilities for what comes next is very large. Advances in hardware, software and theory will take us in many directions. Research is exploration, evolution, often done by random search performed by 10,000 grad students typing on keyboards.
1970 1980 1990 2000
Personalcomputer
Internet
Web
ecommerce
Google ?
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
6
IT EvolutionIT Evolution
1970 1980 1990 2000
Personalcomputer
Internet
Web
ecommerce
Our ebiquity lab at UMBC is exploring some of theseBased on the idea of intelligent, pervasive computing.
?2010
Intelligentsoftwareagents
PervasiveComputing
WearableComputing
SemanticWeb
WebServices
NaturalLanguage
Understanding
AdaptiveSystems
AutonomicSystems
Trust
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
7
Human Evolution?Human Evolution?
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
8
Human Evolution?Human Evolution?
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
9
Human Evolution?Human Evolution?
Pervasive ComputingPervasive Computing aims to embed computing into aims to embed computing into our lives, making it as natural as using other ordinary our lives, making it as natural as using other ordinary objects like pen, paper, and cups and available anytime objects like pen, paper, and cups and available anytime and anywhere.and anywhere.
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
10
(1)(1) Pervasive Pervasive ComputingComputing
“The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it ” – Mark Weiser
Think: writing, central heating, electric lighting, …
Not: taking your laptop to the beach, or immersing yourself into a virtual reality
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
11
Practical Pervasive technology: the ambient Practical Pervasive technology: the ambient orborb
The orb is connected by a pager to a network intrusion detection system monitoring the status of the UMBC network. The number and severity of security incidents are visualized by its changing color and frequency of pulsing.
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
12
Communication is a key enablerCommunication is a key enabler
Cool toys…
Too bad they can’t talk to
each other…
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
13
We have many standardsWe have many standards
Sync. Download
. Done.
Configuration? Too much work…
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
14
The devices must be more The devices must be more socialsocial
Thank God! Everything is done for me!
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
15
Ongoing research issuesOngoing research issues Languages for devices to exchange and share Languages for devices to exchange and share
information using common vocabulariesinformation using common vocabularies User configurable policies for trust and privacyUser configurable policies for trust and privacy Context aware systemsContext aware systems that can anticipate the that can anticipate the
needs of users and act in advance by needs of users and act in advance by “understanding” their situation“understanding” their situation
Intelligent middleware and agents toIntelligent middleware and agents to Sense, acquire and share context knowledgeSense, acquire and share context knowledge Reason about and maintain consistent context Reason about and maintain consistent context
knowledgeknowledge Enforce policies for security, trust, safety & privacyEnforce policies for security, trust, safety & privacy
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
17
Our intell igent roomOur intell igent room
B
Services
RoomBooker
SOAP/OWL
P
Personal Agent(FIPA/JADE)
FIPA-ACL/OWL
(Semantic Web)
Mocha PC8”x6”x2”
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
18
A Typical CoBrA Use CaseA Typical CoBrA Use Case
Alice enters a conference room
The broker negotiatesprivacy policy with Alice
The broker detects Alice’s presence
B ≈≈≈
Policy says, “can share with any agents in the room”
AB
The broker buildsthe context model
Web
The broker knows Alice’s role and
intention
+
Alice in Wonderland*Alice in Wonderland*
* Our intelligent meeting room
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
19
A Typical CoBrA Use CaseA Typical CoBrA Use Case
The projector agent wants to help Alice
The broker informsthe subscribed agents
B A
The projector agentasks slide show info.
B
The broker acquires the slide show info.
BWeb
The broker informs the projector agent
B
The projector agent sets up the slides
Alice in WonderlandAlice in Wonderland
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
20
(2)(2) Wearable Wearable computingcomputing
A new form of human-computer interaction with A new form of human-computer interaction with small body-worn computing components small body-worn computing components Always on, always ready, always accessibleAlways on, always ready, always accessible Supporting hands busy and eyes busy interactionsSupporting hands busy and eyes busy interactions
Not hand held devices, laptop computers and Not hand held devices, laptop computers and personal digital assistants (PDAs).personal digital assistants (PDAs).
Will lead to a new form of synergy between Will lead to a new form of synergy between human and computer, characterized by long-human and computer, characterized by long-term adaptation through constancy of user-term adaptation through constancy of user-interface. interface.
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
21
Wearable computer, Wearable computer, notnot
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
22
Wearable computing, maybeWearable computing, maybe
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
23
Wearable computing, todayWearable computing, today
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
24
(3)(3) Final Thoughts Final Thoughtstwo enabling technologiestwo enabling technologies
The WebThe Web continues to evolve continues to evolve Web services and the semantic web are Web services and the semantic web are
enabling more automation and agentsenabling more automation and agents The web is not just for people anymoreThe web is not just for people anymore Its a universal acid, consuming all in its pathIts a universal acid, consuming all in its path
Wireless communicationWireless communication makes it easy makes it easy and cheap for things to senseand cheap for things to senseand interoperateand interoperate
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
25
The Evolution of Useful The Evolution of Useful ThingsThings
The Evolution of Useful ThingsThe Evolution of Useful Things, , Henry Petroski, 1994.Henry Petroski, 1994.
Before 1900, papers were held Before 1900, papers were held together with straight pens!together with straight pens!
The development of “spring The development of “spring steel” allowed the invention of steel” allowed the invention of the paper clip in 1899.the paper clip in 1899.
It took about It took about 25 years (!)25 years (!) for the for the evolution of the standard “gem evolution of the standard “gem paperclip” considered to be paperclip” considered to be optimal for general use.optimal for general use.
Things take time, but the Things take time, but the incremental results pay the incremental results pay the way.way.
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
26
ClimbingClimbingMountMountImprobableImprobable
“The sheer height of the peak doesn't matter, so long as you don't try to scale it in a single bound. Locate the mildly sloping path and, if you have unlimited time, the ascent is only as formidable as the next step.”
-- Richard Dawkins, Climbing MountImprobable, Penguin Books, 1996.
UMBCUMBCan Honors University in Marylandan Honors University in Maryland
27
http://ebiquity.umbc.edu/http://ebiquity.umbc.edu/