The document proposes ITSME, a new workstation based on a "stories and venues" metaphor. It aims to address issues with personal computers like information dispersion, overload, and inadequacy for knowledge workers. ITSME would integrate all related files, messages, URLs and people within "venues" representing different stories or projects. It also outlines plans for an open-source operating system, migration services, and a non-profit institute to support development. The goal is to create an alternative to Windows and MacOS better suited to knowledge work.
In the last 30 years, the desktop metaphor has become the standard user interface for workstations, with
its pros (e.g., ease of learning) and cons (e.g., interaction constraints for skilled users, lack of context
awareness). In this tutorial we present itsme, an initiative to create the next-generation workstation –
especially designed for users who think that what they do holds value. Much of what we present derives
from CSCW research, while Interaction Design research shapes the project, as well as the involvement of
a wide and heterogeneous community of contributing people. The early design phases of the project led to
the definition of a new metaphor for personal computing, called ‘stories and venues’. The metaphor is
being adopted for the development of a radically new front-end for the Linux operating system.
The tutorial illustrates (through the itsme case) how CSCW research can drive the design and
development of an innovative project
Lessons for the Industrial Internet (pdf with notes)Tim O'Reilly
This my talk from the General Electric Minds + Machines event on the #IndustrialInternet in San Francisco on November 30, 2012. I talk about the lessons from the Internet that can be applied to the Industrial Internet.
Open Innovation aka How companies can use social media to dialogue with their...itsmesrl
Open Innovation aka How companies can use social media to dialogue with their real and potential users.
Presentation by Nico at IULM, "Yes, Web can" event, January 23 2009.
In the last 30 years, the desktop metaphor has become the standard user interface for workstations, with
its pros (e.g., ease of learning) and cons (e.g., interaction constraints for skilled users, lack of context
awareness). In this tutorial we present itsme, an initiative to create the next-generation workstation –
especially designed for users who think that what they do holds value. Much of what we present derives
from CSCW research, while Interaction Design research shapes the project, as well as the involvement of
a wide and heterogeneous community of contributing people. The early design phases of the project led to
the definition of a new metaphor for personal computing, called ‘stories and venues’. The metaphor is
being adopted for the development of a radically new front-end for the Linux operating system.
The tutorial illustrates (through the itsme case) how CSCW research can drive the design and
development of an innovative project
Lessons for the Industrial Internet (pdf with notes)Tim O'Reilly
This my talk from the General Electric Minds + Machines event on the #IndustrialInternet in San Francisco on November 30, 2012. I talk about the lessons from the Internet that can be applied to the Industrial Internet.
Open Innovation aka How companies can use social media to dialogue with their...itsmesrl
Open Innovation aka How companies can use social media to dialogue with their real and potential users.
Presentation by Nico at IULM, "Yes, Web can" event, January 23 2009.
Ember (along with a whole family of related open source tools) is steadily reducing the cost of shipping sophisticated applications. By making it easier to compose applications out of high-level, shared pieces, and deploy them on demand to commodity hosting, we've been sowing the seeds for a revolution in how software gets built and paid for. This is a talk about both the technical "how" -- including the latest work in the Cardstack project -- and the "why": our opportunity to grow an open, decentralized software ecosystem that can sustainably pay for open source while respecting user freedom.
Chatbots are growing in popularity as developers face the
limitations of the mobile app. User interfaces that simulate a human
conversation, the history of chatbots goes back to the late 18th
century. I'll take you on a tour of that history with an eye on finding
insights on what is possible today and in the near future with chatbots.
Issues Covered: Amazon Alexa, Facebook Messenger Chatbots, Alan
Turing, and much more.
IT Performance Management Handbook for CIOsVikram Ramesh
Learn why measuring performance on individual devices and systems often leaves admins flying blind when it comes to SLA management and identifying performance bottlenecks. This in-depth e-Guide talks about how VirtualWisdom4 can give administrators a live, up- to-the-second view across the system-wide IT infrastructure.
A LITERATURE REVIEW ON SEMANTIC WEB – UNDERSTANDING THE PIONEERS’ PERSPECTIVEcsandit
There are various definitions, view and explanations about Semantic Web, its usage and its underlying architecture. However, the various flavours of explanations seem to have swayed way off-topic to the real purpose of Semantic Web. In this paper, we try to review the literature of Semantic Web based on the original views of the pioneers of Semantic Web which includes, Sir Tim Berners-Lee, Dean Allemang, Ora Lassila and James Hendler. Understanding the vision of the pioneers of any technology is cornerstone to the development. We have broken down Semantic Web into two approaches which allows us to reason with why Semantic Web is not mainstream.
FSter is the first component we (itsme) are releasing to the development community, as an essential part of Guglielmo that might be reused by other projects and applications with similar needs: you can get it from here.
FSter is a virtual file system implementation based on Fuse technology and exploiting Tracker metadata technology to allow access to files according to the metadata they’re associated to. Practically, FSter enables scenarios such as the following ones:
* browsing the content of a drive (or simply of a folder) according to a user-defined hierarchy or progression of filters based on metadata;
* associating metadata to files whenever operations are performed on them. For example, copying or saving a file in a specific place means storing it along with a description (metadata);
* generating “virtual” files from metadata, e.g., a vCard file that is not really on the file system, but dynamically built from metadata.
In order for you to be able to install, use, and extend FSter, or to contribute in any other way, we have set up some tools online:
* a wiki where you can find detailed information on the project, descriptions and instructions: http://gitorious.org/itsme/pages/Fster
* a bug reporting system (i.e., Bugzilla) where you can file any problem you find in our software: http://bugs.itsme.it
* a mailing lists system where you can subscribe to discussions and interact with us and other developers: http://lists.itsme.it
* an IRC channel where you will find (most of) the itsme technical staff all day long (well, Italian time mainly – i.e., GMT +1): #itsme-dev on irc.freenode.net
Ember (along with a whole family of related open source tools) is steadily reducing the cost of shipping sophisticated applications. By making it easier to compose applications out of high-level, shared pieces, and deploy them on demand to commodity hosting, we've been sowing the seeds for a revolution in how software gets built and paid for. This is a talk about both the technical "how" -- including the latest work in the Cardstack project -- and the "why": our opportunity to grow an open, decentralized software ecosystem that can sustainably pay for open source while respecting user freedom.
Chatbots are growing in popularity as developers face the
limitations of the mobile app. User interfaces that simulate a human
conversation, the history of chatbots goes back to the late 18th
century. I'll take you on a tour of that history with an eye on finding
insights on what is possible today and in the near future with chatbots.
Issues Covered: Amazon Alexa, Facebook Messenger Chatbots, Alan
Turing, and much more.
IT Performance Management Handbook for CIOsVikram Ramesh
Learn why measuring performance on individual devices and systems often leaves admins flying blind when it comes to SLA management and identifying performance bottlenecks. This in-depth e-Guide talks about how VirtualWisdom4 can give administrators a live, up- to-the-second view across the system-wide IT infrastructure.
A LITERATURE REVIEW ON SEMANTIC WEB – UNDERSTANDING THE PIONEERS’ PERSPECTIVEcsandit
There are various definitions, view and explanations about Semantic Web, its usage and its underlying architecture. However, the various flavours of explanations seem to have swayed way off-topic to the real purpose of Semantic Web. In this paper, we try to review the literature of Semantic Web based on the original views of the pioneers of Semantic Web which includes, Sir Tim Berners-Lee, Dean Allemang, Ora Lassila and James Hendler. Understanding the vision of the pioneers of any technology is cornerstone to the development. We have broken down Semantic Web into two approaches which allows us to reason with why Semantic Web is not mainstream.
FSter is the first component we (itsme) are releasing to the development community, as an essential part of Guglielmo that might be reused by other projects and applications with similar needs: you can get it from here.
FSter is a virtual file system implementation based on Fuse technology and exploiting Tracker metadata technology to allow access to files according to the metadata they’re associated to. Practically, FSter enables scenarios such as the following ones:
* browsing the content of a drive (or simply of a folder) according to a user-defined hierarchy or progression of filters based on metadata;
* associating metadata to files whenever operations are performed on them. For example, copying or saving a file in a specific place means storing it along with a description (metadata);
* generating “virtual” files from metadata, e.g., a vCard file that is not really on the file system, but dynamically built from metadata.
In order for you to be able to install, use, and extend FSter, or to contribute in any other way, we have set up some tools online:
* a wiki where you can find detailed information on the project, descriptions and instructions: http://gitorious.org/itsme/pages/Fster
* a bug reporting system (i.e., Bugzilla) where you can file any problem you find in our software: http://bugs.itsme.it
* a mailing lists system where you can subscribe to discussions and interact with us and other developers: http://lists.itsme.it
* an IRC channel where you will find (most of) the itsme technical staff all day long (well, Italian time mainly – i.e., GMT +1): #itsme-dev on irc.freenode.net
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
Itsme A New Workstation To Exploit The Potential Of The Cyberspace 02
1.
2. Fatti non foste a viver come bruti,
ma per seguir virtute e conoscenza.
Ye were not made to live like unto brutes,
But for pursuit of virtue and of knowledge.
Dante Alighieri , La Divina Commedia, Inferno,
Canto XXVI, 119-120, Transl. by A. Mandelbaum
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 2
3. The scenario
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 3
4. At the 1984 Superbowl
Apple launches the Macintosh:
A new personal computer with graphical user interface based
on the desktop metaphor
It brings forth the ideas developed at Xerox PARC by Alan Kay
and others to a large public, at a reasonable price
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 4
5. And then …
All personal computers adopt the desktop metaphor
There is a dramatic growth of the size of internal and external as
well as fixed and removable memories of personal computers
The email becomes a universal medium
Tim Berners - Lee invents the Web
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 5
6. Moreover, …
The Web, originally a system for publishing documents, grows and
becomes capable of offering a large variety of services:
Downloading of files
Shared information spaces
E-commerce
Blogs and wikis
Chats
Social computing (Web 2.0)
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 6
7. Three main problems
The personal computer has been unable to cope with the evolution
of the Cyberspace:
dispersion of information (in the file system, the attachment
folder, the e-mail systems, the browser)
information overload (from keys to gigas; more and bigger
objects)
inadequacy of the file system with respect to the web (its
content remains without tags, links and structure)
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 7
8. Unforeseen facts
Dispersion of information supports sub-optimal search methods (from messages
to attachments, from documents to urls, …): a casual and incomplete divide et
impera strategy.
More and more efficient search engines.
The web is constantly becoming more capable of providing all the functions of
personal computers: do we still need personal computers?
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 8
9. Still some problems remain
On-line computing is not yet ubiquitous
The personal computer has some capabilities missing, compared with the web
Different users have different needs and desires: personal computers based on the
desktop metaphor are not adequate for some of them
Who has control?
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 9
10. Our idea
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 10
11. A new workstation
Avoiding the dispersion of information
Embodying what we know about knowledge work
Designed for those people who “think what they do has value”
Based on a new metaphor: “stories and venues”
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 11
12. Avoiding the dispersion of files
A new front-end where:
related objects, messages, urls, people addresses, information sources,
tools appear in a single place
All objects are characterized by tags and links
No solution, today, to the structure problem: in any case we have plans for the
future with respect to this problem
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 12
13. No solution as yet for the information overload
Putting everything in the same place does not solve the information overload
problem. Moreover, it increase it
A hierarchical file system leads to greater confusion
Good search engines do not solve the problem: while performing an action we
need to have everything that maybe relevant, ready at hand
Searching distracts from the action we are performing
No real change with respect to the desktop metaphor
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 13
14. The lessons of ethnographic research on work
What human beings do is embedded in their relations with other people: actions
and interactions
Action and communication are strictly intertwined
Any action is situated in space, time and, often, in the story within which it has
sense
The stories a person lives are not disjoint
Stories are viewpoints on actions and interactions
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 14
15. The target users of ITSME
High - value users, i.e., all those who have a great number of interactions with
other people, manage loads of information, live a great number of stories at the
same time, but do not have adequate support to manage the complexity of their
life
Professionals
Managers
Intellectuals
Knowledge workers
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 15
16. The limits of the desktop metaphor
The desktop metaphor has been able to sort workstation contents in a simple and
intuitive way
But it has not solved any of the problems people encounter while managing their
actions and interactions
Where is the message John sent me about that issue? Where did Rick tell me that
important thing? Which is the relevant part of this huge document?
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 16
17. Beyond the desktop metaphor
The desktop metaphor is over thirty years old.
And it shows!
The displays of today’s workstations are either populated with a huge number of
icons or require functional commands to find an object.
In both cases, users frequently do not find what they are looking for, or find the
wrong thing
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 17
18. A new metaphor: stories and venues
Our life interweaves a large number of different stories
Each story has its participants and objects
Each story has its venue, where you can access its participants and objects
Each person lives in several diverse interweaving venues
The new metaphor is characterized by its being plural and its reflecting
situatedness of human experience
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 18
19. itsme / a workstation based on the metaphor of “stories and venues”
At any moment, ITSME presents the venue of the story in which its owner is acting
ITSME owners do not need to search for things: they have them ready at hand
ITSME creates, maintains and updates the venues of its owner
ITSME venues can be easily corrected, modified and/or organized by its owner
ITSME is not intrusive: its behavior is purely reactive
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 19
20. A metaphor implemented through a light model
It lseems that if venues constitute a hierarchy, but the same file or resource can
appear in different venues
Users can move things between venues, and also copy things to different venues
Venues may have sub-venues. Sub-venues are not hierarchical: rather they define
viewpoints on venues
The hierarchical model is only a light support to the metaphor
The metaphor helps users understand what they see on the screen
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 20
21. Creating a new workstation and
communicating it
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 21
22. ITSME components
An open-source operating system embodying the venue metaphor in
its front-end
A new workstation, with a radically new design
A service supporting the migration of users from Apple and Microsoft
workstations to ITSME
A consistent and reliable plan for further improvements of the system
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 22
23. ITSME / the operating system
A radically new front-end to Linux, based on two simple rules:
Objects created in a venue remain there
Objects arriving with the reply to a message coming from
a venue go in that venue
In the venue where a story is performed, users can access:
their partners in that story
the files, email messages and web bookmarks created, exchanged and shared
in it
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 23
24. Some examples from the concept manual: the interface model
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 24
25. Some examples from the concept manual: the interface architecture
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 25
26. Some examples from the concept manual: the home
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 26
27. Some examples from the concept manual: the home
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 27
28. Some examples from the concept manual: a venue
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 28
29. Some examples from the concept manual: the limbo and
the transition panel
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 29
30. ITSME / the operating system
Venues may be further organized (sub-venues, folders) by users
One-click mechanisms for correcting, modifying and organizing venues
In the Limbo, users find what has not yet been located in a venue (what has not
yet given raise to a story)
On the screen, a transit zone is always accessible, to move and/or copy files
A search engine to searching in other venues
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 30
31. ITSME / the operating system
Based on Linux
The front-end is perfectly coupled with the underlying Linux operating system, so
that the system performs effectively
The front - end is based on a newly conceived interface design allowing users to
understand effortlessly what is going on, even when changes are not generated
by the user
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 31
32. The migration service
Associating applications running on Vista and/or Mac OS to the applications
running on Linux, allowing users to continue working on their files
Selecting a Vista (Mac OS) emulator to run applications not supported by Linux
Putting by default in the Limbo the contents of the previous machine not yet
located immediately in a story
Defining the interaction protocol for creating new venues and placing objects
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 32
33. ITSME / further improvements
A new Linux file system, where files can be tagged, linked and have an XML
structure
An email system supporting conversations, with bi-directional links between
messages and attachments
A browser locating its bookmarks in the file system
Navigation systems within venues
Multiple views of venues
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 33
34. Development milestones
A three - year process
Two years for the development of the front-end
(spring 2008 - spring 2010)
One year and a half for the development of a hardware prototype
(spring 2009 - autumn 2010)
Two years for the development of the migration support system
(autumn 2008 - autumn 2010)
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 34
35. The help we need
Three active communities, supporting Itsme from the very beginning
Research (CSCW, KM; ID)
Open source software (Linux community)
High-Tech industry (particularly in Europe)
Good coverage of Itsme milestones by media and research community world-
wide
Support from public institutions in Italy and Europe
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 35
36. Next steps in communication
An interactive web site (Web 2.0)
On line testing of the concept
Presentations in major Universities/cities all around the world
Courses at major Universities and Educational Institutions all around the world
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 36
37. Selling an innovation
Proving Itsme's with added value with respect to competitors
Proving system and after market - assistance reliability of the Itsme initiative
Granting small migration costs (moving from Vista or Mac OS to Itsme is not more
costly than moving from one version to another of those systems)
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 37
38. The company
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 38
39. The ITSME team
A growing multi-disciplinary team organized in three work areas:
Interaction Design
Development and Open Source Software
Communication and Innovation
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 39
40. The partners of ITSME
Giorgio De Michelis, who is its CEO
A group (≥20) of founding partners, subscribing the majority of its capital
A group of academic institutions (among which, University of Milano - Bicocca,
whose it is a spin-off)
The managers of the company, who will receive warrants, allowing them to
participate in value creation
Venture capitalists, who will provide the financial resources needed to reach its
objectives
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 40
41. The Scientific Committee
A growing group of senior scholars in the field advising the company on its
activities:
Alfonso Fuggetta (Politecnico di Milano and Cefriel)
Patrizia Marti (University of Siena)
Roberto Polillo (University of Milano - Bicocca)
Marco Susani (Motorola Corp., Chicago)
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 41
42. The Advisory Board
A group of senior managers and entrepreneurs advising the company on its
business plans. Among its members:
Elserino Piol (chair)
Luca De Michelis
Roberto Galimberti
Emanuele Marcianò
Roberto Polillo
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 42
43. The ITSME Institute
A non-profit association, called ITSME Institute, will be created to better access
public funding for open source code development
Giorgio De Michelis and Itsme will control the Institute
The Association will be open to research and academic institutions
The Association will allow significant cost reduction, if design and development
will be funded by public institutions
02/12/08 ITSME a new workstation to exploit the potential of the cyberspace 43
44. Thank you for your attention!
giorgio.demichelis@itsme.it
www.itsme.it