Skip to main content

Files as UI

Files as UI vs API -  compares attributes of iCloud vs Dropbox. It starts on an interesting note - the model of a file system in the UI is dying, and should be let go. Beyond that it looks at mappings of each system to a file system from an API point of view and compares the successes of each.

I find the initial thread the most interesting. Drop the mental model of a file system - which maps virtual concepts of files and directories to a physical model of papers, folders and file cabinets - and replace it with...what? This is a paradigm shift for me.

I have to admit, I loath, hate, nay, despise looking for things. If I can't find something easily, it's only about a minute before I start growling and muttering things my mother would disapprove of. On this basis, I like the idea that I can save myself from thinking about where to put things or, where I have already put them. But how do we do this? It's non-trivial, since humans think of "things" and once they think of a thing, it's place is a very closely associated and implicit property of an object. Look at the definition of a Uniform Resource Identifier (URI) - it's built in part upon the URL - Uniform Resource Location.

An obvious approach is to focus on applications - tools - that hide the details of a file system from you? That's not too hard to imagine, but is that a paradigm shift? And is it a strong enough model to prevent "fraying" at the edges, where every once in a while, for edge use cases, you need to think about where your stuff is?

What about "things" (formerly called "files", "data", etc.) having names, which don't include any "where" type information. It's all "what" and "how". An object has a name, and perhaps the name includes information on the type of thing it is. The how information is "Is this backed up?", "Is this available from any device or just one?", "Is this private, really private or public?"


Comments

BenJammin' said…
I'll start this by saying that the comment box, when accessed from my phone, provides autocorrect solutions regarding my address and phone number; weird. Anyway, I think I might have an argument in favor of keeping the location-based paradigm. It has less to do with the technology, and more to do with us. Given the staggering amount of things I may or may not have to remember that are on my computer, I often find I can't even think of the name of what I'm looking for until I've navigated to the place where I know I can find it. Location has a very strong foot in human memory; I would be interested to know what system could replace filling in terms of it's ability to interface with the way we naturally structure our thinking
BenJammin' said…
I'll start this by saying that the comment box, when accessed from my phone, provides autocorrect solutions regarding my address and phone number; weird. Anyway, I think I might have an argument in favor of keeping the location-based paradigm. It has less to do with the technology, and more to do with us. Given the staggering amount of things I may or may not have to remember that are on my computer, I often find I can't even think of the name of what I'm looking for until I've navigated to the place where I know I can find it. Location has a very strong foot in human memory; I would be interested to know what system could replace filling in terms of it's ability to interface with the way we naturally structure our thinking

Popular posts from this blog

Let's Not Mess Around with Security on our Personal Systems Either!

Essential Security Practices for Your Personal Systems Ensuring a minimal level of cybersecurity, privacy, and availability on your personal systems means you need to manage the following essential practices. This is a brief overview of recommendations from sources like CISA, NSA, etc., focused on personal laptop, phone, and other systems' security. Anti-virus  I've found you'll get the best anti-virus protection and usability from a paid product - I've always had good luck with Norton labeled products. If you are looking for current vendor offerings see:  https://www.pcmag.com/picks/the-best-antivirus-protection Regardless of whether you choose to use a commercial product or open-source anti-virus tool, it is absolutely something you need to use. This is the minimally needed level of system security. Once installed, ideally, it should be invisible until there's a security problem it can't prevent or solve.   Backups You need to have at least a minimal level of ...

RACI, Cybersecurity and NICE Framework

The NICE framework from a RACI point of view The NICE framework ( NIST SP 800-181 rev. 1) established a standard approach for describing cybersecurity work, in order to help stakeholders share a common language and ideally improve how to identify, recruit, develop and retain talent. It breaks down cybersecurity work role categories into: Oversight and Governance; Design and Development; Implementation and Operation; Protection and Defense; Investigation.  Which is very cybersecurity-centric and not related to common tools for project management within companies. Especially smaller enterprises that do not have dedicated people to mange and coordinate cybersecurity needs. A  RACI chart  is   a project management tool used to define and clarify roles and responsibilities within a project team.   It stands for Responsible, Accountable, Consulted, and Informed, and visually represents who is responsible for what, who is accountable for the outcome, who needs to be c...

Typescript - It might not be easier, but but it's surely different

Typescript is a statically typed language, that is a superset of JavaScript. I've had the discussions and debates about that aspect of the language. I am all for static typing. Any way my tools can help me be better is alright by me. So I avoid the ' any ' type designation and make sure I have guards on ' unknown ' types, as much as I can.  Any  does not carry any useful type information, while unknown does, and allows it to enforce type checking.  Anything can be assigned to a variable of type unknown , but an unknown value cannot be assigned to variables of other types without explicit type assertion or narrowing. Similarly, no operations are permitted on an unknown value until its type is refined. This behavior ensures type safety and prevents runtime errors. (Refined with help from google). I bring this up because I was arguing with the compiler recently because I'd assumed both made no use on any type information in any circumstance - because I haven't ...