// archives

ubiquitous computing

This tag is associated with 2 posts

FCJ-137 Affective Experience in Interactive Environments

Jonas Fritsch Department of Aesthetics and Communication, Aarhus University Introduction Digital technologies in new interactive environments are radically affecting the way we experience and make sense of the world. The advent of ubiquitous computing in particular has led to the development of advanced sensor technologies and microchips, moving the realm of computing from the desktop computer into broader contexts of interaction or interactive environments (Weiser, 1991). It seems, however, that there has been a shift from the original vision of ubiquitous computing in the light of the possibilities that a ubiquitous computational infrastructure has actually been shown to offer. Mark Weiser’s initial ideal of disappearing computers, so the technology resides in the background to let us focus on more important things, is no longer the only way of working with ubiquitous computing and technologies. Among others, Yvonne Rogers has proposed a new agenda for the design of UbiComp technologies focused […]

FCJ-135 Feral Computing: From Ubiquitous Calculation to Wild Interactions

Matthew Fuller and Sónia Matos Centre for Cultural Studies, Goldsmiths, University of London Introduction In ‘The Coming Age of Calm Technology’, Mark Weiser and John Seely Brown are clear in their assertions. What really ‘matters’ about technology is not technology in itself but rather its capacity to continuously recreate our relationship with the world at large (Brown and Weiser, 1996). Even though they promote such an idea under the banner of ‘calm technology’, what is central to their thesis is the mutational capacities brought into the world by the spillage of computation out from its customary boxes. What their work tends to occlude is that in setting the sinking of technology almost imperceptibly, but deeply into the ‘everyday’ as a target for ubiquitous computing, other possibilities are masked, for instance those of the greater hackability or interrogability of such technologies. Our contention is that making ubicomp seamless (MacColl et al, […]